Published:2007/02/09 Last Updated:2008/05/21
JVN#84430861
Sage vulnerable to arbitrary script execution
Overview
Sage is an RSS and Atom feed reader extension for Mozilla Firefox. If a malicious script is embedded in an RSS feed, Sage does not properly handle the data, which may allow an arbitrary script to be executed on a user's web browser.
Products Affected
- Sage 1.3.9 and earlier
As of February 9, 2007, Sage++ is no longer available and is no longer being updated. It is recommended that Sage++ users use the latest version of Sage.
Description
Impact
An arbitrary script may be executed on Mozilla Firefox. For example, local files could be accessed.
Solution
Vendor Status
Vendor | Link |
Sage |
Sage 1.3.10 Released |
Sage: Install |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2007.02.09
Measures | Conditions | Severity |
---|---|---|
Access Required | Routed - can be attacked over the Internet using packets |
|
Authentication | None - anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file |
|
Exploit Complexity | Low - little to no expertise and/or luck required to exploit (cross-site scripting) |
|
Credit
Daiki Fukumori of Secure Sky Technology, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE | |
JVN iPedia |
JVNDB-2007-000134 |