JVN#7F8621DE
DonutP and UnDonut confirmation dialog display vulnerability
Overview
DonutP and its successor, unDonut, are IE-based tabbed web browsers. In DonutP and old versions of unDonut, Donut.P API does not require explicit user consent. Therefore DonutP and unDonut contain a vulnerability which may allow an attacker to execute a cross-site scripting and other attacks.
DonutP.API is disabled by default, so this vulnerability only affects users who have activated it.
In unDonut release10-beta-2 and later versions, the function displaying a dialog when a script is executed is enabled by default, and it requires an user's confirmation whether the script should be executed or not.
Users of DonutP or old versions of unDonut are recommended to upgrade to the latest version of unDonut. Users are also recommended to enable the confirmation dialog display function when a script is to be executed.
Products Affected
- All versions of DonutP
- Versions of unDonut earlier than 10-beta-2
Description
Impact
An attacker could take over the user's web browser when the user views the malicious page.
Solution
Vendor Status
Vendor | Link |
unDonut |
http://undonut.sakura.ne.jp/ |
References
JPCERT/CC Addendum
Credit
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE | |
JVN iPedia |
JVNDB-2006-000616 |