5.6 Medium
AI Score
Confidence
High
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.003 Low
EPSS
Percentile
71.0%
The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.
CPE | Name | Operator | Version |
---|---|---|---|
mozilla:firefox | mozilla firefox | le | 2.0.0.9 |
mozilla:seamonkey | mozilla seamonkey | le | 1.1.6 |
blog.beford.org/?p=8
h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
osvdb.org/43477
www.mozilla.org/security/announce/2007/mfsa2007-37.html
www.vupen.com/english/advisories/2008/0083
bugzilla.mozilla.org/show_bug.cgi?id=369814
bugzilla.mozilla.org/show_bug.cgi?id=403331
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6033