Lucene search

K
mozillaMozilla FoundationMFSA2009-22
HistoryApr 21, 2009 - 12:00 a.m.

Firefox allows Refresh header to redirect to javascript: URIs — Mozilla

2009-04-2100:00:00
Mozilla Foundation
www.mozilla.org
9

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.034 Low

EPSS

Percentile

91.4%

Mozilla community member Michael reported that when a server responds with a Refresh header containing a javascript: URI, Firefox will redirect to the javascript: URI. If an attacker could inject a Refresh header into a server response, or could control the value that a site places in the Refresh header, they could use this vulnerability to perform an XSS attack and execute arbitrary JavaScript within the context of that site.

CPENameOperatorVersion
firefoxlt3.0.9

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.034 Low

EPSS

Percentile

91.4%