Vulnerability Note VU#885753
Mozilla browsers "location.hostname" cross-domain vulnerability
Mozilla-based browsers contain a cross-domain vulnerability, which may allow an attacker to access data in other sites.
Mozilla uses a same origin security model to maintain separation between browser frames from different sources. This model is designed to prevent code in one domain from accessing data in a different domain. From the same origin policy:
Mozilla considers two pages to have the same origin if the protocol, port (if given), and host are the same for both pages.
By convincing a victim to view an HTML document (web page), an attacker could modify data in another domain. For example, web page script in one domain could set a cookie for a web page in another domain.
Apply an update
Disable the ability to set location.hostname
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Mozilla||Affected||15 Feb 2007||15 Feb 2007|
CVSS Metrics (Learn More)
This vulnerability was publicly disclosed by Michal Zalewski.
This document was written by Will Dormann.
- CVE IDs: CVE-2007-0981
- Date Public: 14 Feb 2007
- Date First Published: 15 Feb 2007
- Date Last Updated: 09 Mar 2007
- Severity Metric: 6.76
- Document Revision: 47
If you have feedback, comments, or additional information about this vulnerability, please send us email.