Mozilla Foundation Security Advisory 2010-60
Title: XSS using SJOW scripted function
Impact: High
Announced: September 7, 2010
Reporter: moz_bug_r_a4
Products: Firefox, Thunderbird, SeaMonkey
Fixed in: Firefox 3.5.12
Thunderbird 3.0.7
SeaMonkey 2.0.7
Description
Mozilla security researcher moz_bug_r_a4 reported that the wrapper class XPCSafeJSObjectWrapper (SJOW) on the Mozilla 1.9.1 development branch has a logical error in its scripted function implementation that allows the caller to run the function within the context of another site. This is a violation of the same-origin policy and could be used to mount an XSS attack.
References
* https://bugzilla.mozilla.org/show_bug.cgi?id=585284
* CVE-2010-2763