Vulnerability Note VU#651928

Mozilla may allow violation of cross-domain scripting policies via dragging

Original Release date: 17 Sep 2004 | Last revised: 17 Sep 2004

Overview

A vulnerability affecting Mozilla web browsers may allow violation of cross-domain scripting policies and possibly execute code originating from a remote source.

Description

Mozilla web browsers allow the dragging of links and objects from one window to another. Should the object copied be javascript, then it may execute in the context of a script originating from a local source rather than a remote location. According to Mozilla's bug report:

    "The user could be convinced to drag obscurred links in the context of a game or even a fake scrollbar. If the user could be convinced to drag two links in sequence into a separate window (not frame) the attacker would be able to run arbitrary programs."

Impact

This vulnerability could be used to exploit cross-domain scripting policies and possibly execute code originating from a remote source.

Solution

This vulnerability is resolved in Firefox Preview Release, Mozilla 1.7.3, and Thunderbird 0.8.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
MozillaNot Affected-17 Sep 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

Thanks to Jesse Ruderman for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

  • CVE IDs: Unknown
  • Date Public: 14 Sep 2004
  • Date First Published: 17 Sep 2004
  • Date Last Updated: 17 Sep 2004
  • Severity Metric: 25.31
  • Document Revision: 9

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.