4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.933 High
EPSS
Percentile
99.0%
Mozilla Firefox allows cross-domain access to an iframe. This vulnerability could allow an attacker to interact with a web site in a different domain. The attacker could read content and cookies, capture keystrokes, and modify content.
An iframe is an HTML element which allows an HTML document to be embedded inside a master HTML document.
The Mozilla same origin policy states:
_The same origin policy prevents document or script loaded from one origin from getting or setting properties of a document from a different origin. The policy dates from Netscape Navigator 2.0.
Mozilla considers two pages to have the same origin if the protocol, port (if given), and host are the same for both pages._
Firefox does not properly enforce the same origin policy to web pages that use iframes.
From Mozilla Bugzilla Bug ID 382686:
_The problem you fixed there is that document.write() could be used to overwrite frames that originate from Internet-based SRC= pointing to non-same-domain site. This is fixed and throws a security exception.
Unfortunately, the check implemented means that about:blank frames can be overwritten freely; and unfortunately, all frames, even with Internet SRC= specified, will be vulnerable to a race condition while the document loads._
Note that some websites that allow users to supply content may allow iframes to be included.
An attacker may be able to obtain sensitive data from a user, modify the appearance of a webpage or track keystrokes. Depending on the nature of the web site the user was visiting, this data may include passwords, credit card numbers, and any arbitrary information provided by the user.
Mozilla has addressed this issue with Firefox 2.0.0.5. Please see Mozilla Foundation Security Advisory 2007-20 for details.
Workarounds for users
* Disable JavaScript (see [Securing Your Web Browser](<http://www.us-cert.gov/reading_room/securing_browser/>)).
* Use the [NoScript](<https://addons.mozilla.org/en-US/firefox/addon/722>) Firefox Add-on to whitelist what sites can run JavaScript.
* Type in URLs directly in the web browser's address bar, or use bookmarks to navigate to websites.
* See the [Cross-Site Scripting Vulnerabilities](<http://www.cert.org/archive/pdf/cross_site_scripting.pdf>) document for general information.
Workarounds for administrators
* Do not allow user submitted content to include JavaScript.
* Do not allow users to submit content to a shared resource that includes iframes. A shared resource may include the comments section of a blog or a web forum.
* Monitor the content submitted by third parties for malicious JavaScript or iframes.
143297
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: July 18, 2007
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see Mozilla Foundation Security Advisory 2007-20 for further details.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23143297 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was reported by Michal Zalewski on the Full-Disclosure mailing list.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2007-3089 |
---|---|
Severity Metric: | 8.51 Date Public: |
archives.neohapsis.com/archives/fulldisclosure/2007-06/0026.html
secunia.com/advisories/26095/
secunia.com/advisories/26288/
www.antiphishing.org/consumer_recs.html
www.cert.org/archive/pdf/cross_site_scripting.pdf
www.mozilla.org/projects/security/components/same-origin.html
www.mozilla.org/security/announce/2007/mfsa2007-20.html
www.stopbadware.org/home/security#preventing
www.us-cert.gov/reading_room/securing_browser/
www.w3.org/TR/html401/present/frames.html#h-16.5
www.w3schools.com/tags/tag_iframe.asp
addons.mozilla.org/en-US/firefox/addon/722
bugzilla.mozilla.org/show_bug.cgi?id=382686