Vulnerability Note VU#143297
Mozilla Firefox allows cross-domain access to an iframe. This vulnerability could allow an attacker to interact with a web site in a different domain. The attacker could read content and cookies, capture keystrokes, and modify content.
An iframe is an HTML element which allows an HTML document to be embedded inside a master HTML document.
The Mozilla same origin policy states:
Mozilla considers two pages to have the same origin if the protocol, port (if given), and host are the same for both pages.
From Mozilla Bugzilla Bug ID 382686:
Unfortunately, the check implemented means that about:blank frames can be overwritten freely; and unfortunately, *all* frames, even with Internet SRC= specified, will be vulnerable to a race condition while the document loads.
An attacker may be able to obtain sensitive data from a user, modify the appearance of a webpage or track keystrokes. Depending on the nature of the web site the user was visiting, this data may include passwords, credit card numbers, and any arbitrary information provided by the user.
Mozilla has addressed this issue with Firefox 220.127.116.11. Please see Mozilla Foundation Security Advisory 2007-20 for details.
Workarounds for users
Workarounds for administrators
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Mozilla||Affected||-||18 Jul 2007|
CVSS Metrics (Learn More)
This vulnerability was reported by Michal Zalewski on the Full-Disclosure mailing list.
This document was written by Ryan Giobbi.
- CVE IDs: CVE-2007-3089
- Date Public: 04 Jun 2007
- Date First Published: 08 Jun 2007
- Date Last Updated: 14 Mar 2008
- Severity Metric: 8.51
- Document Revision: 52
If you have feedback, comments, or additional information about this vulnerability, please send us email.