JVN#38605899
Mozilla Firefox cross-site scripting vulnerability
Overview
Mozilla Firefox, web browser from Mozilla Corporation and Mozilla Japan, contains a cross-site scripting vulnerability.
Products Affected
- Firefox prior to version 2.0.0.2
- Firefox prior to version 1.5.0.10
Description
Mozilla Firefox interprets HTML data improperly and activates event handlers for invalid HTML elements, leading to a cross-site scripting vulnerability.
Impact
An arbitrary script may be executed on the user's web browser.
Solution
Upgrade the Software
Mozilla has released Firefox 2.0.0.2 and 1.5.0.10 which address this vulnerability. We recommend that users of the affected products upgrade to the fixed version of the software.
Vendor Status
Vendor | Link |
Mozilla Japan |
Mozilla Foundation Security Advisory 2007-02 (Japanese) |
Mozilla |
Mozilla Foundation Security Advisory 2007-02 |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2007.06.01
Measures | Conditions | Severity |
---|---|---|
Access Required | Routed - can be attacked over the Internet using packets |
|
Authentication | None - anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file |
|
Exploit Complexity | Low - little to no expertise and/or luck required to exploit (cross-site scripting) |
|
Credit
HASEGAWA, Yosuke of webappsec.jp reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE |
CVE-2007-0995 |
JVN iPedia |
JVNDB-2007-000176 |