Published:2006/04/27  Last Updated:2008/05/21

JVN#7F8621DE
DonutP and UnDonut confirmation dialog display vulnerability

Overview

DonutP and its successor, unDonut, are IE-based tabbed web browsers. In DonutP and old versions of unDonut, Donut.P API does not require explicit user consent. Therefore DonutP and unDonut contain a vulnerability which may allow an attacker to execute a cross-site scripting and other attacks.

DonutP.API is disabled by default, so this vulnerability only affects users who have activated it.

In unDonut release10-beta-2 and later versions, the function displaying a dialog when a script is executed is enabled by default, and it requires an user's confirmation whether the script should be executed or not.

Users of DonutP or old versions of unDonut are recommended to upgrade to the latest version of unDonut. Users are also recommended to enable the confirmation dialog display function when a script is to be executed.

Products Affected

  • All versions of DonutP
  • Versions of unDonut earlier than 10-beta-2

Description

Impact

An attacker could take over the user's web browser when the user views the malicious page.

Solution

Vendor Status

Vendor Link
unDonut http://undonut.sakura.ne.jp/

References

JPCERT/CC Addendum

Credit

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia JVNDB-2006-000616

Update History