Vulnerability Note VU#911004

Mozilla Firefox fails to properly handle the "XPCNativeWrapper(window).Function(...)"

Original Release date: 01 Aug 2006 | Last revised: 09 Feb 2007


Certain Mozilla products contain a cross-site scripting vulnerability because of a vulnerability in the XPCNativeWrapper function.



Per Mozilla, XPCNativeWrapper is a way to wrap up an object so that it is safe to access from privileged code. It is used to allow chrome code to access DOM objects.

The Problem

An attacker can use the XPCNativeWrapper function to inject script into a browser window that may be in a different domain. This violates the Netscape same-origin policy.


By convincing a victim to view an HTML document (web page), an attacker could evaluate script in a different security domain than the one containing the attacker's document. The attacker could read or modify data in other web sites (read cookies/content, modify/create content, etc.). If the script is evaluated with chrome privileges, an attacker could execute arbitrary commands on the user's system.


This issue is addressed in the updates to Mozilla Firefox and Thunderbird, and the 1.0.3 version of Seamonkey. Refer to Mozilla Foundation Security Advisory 2006-54 for more details.

Disable JavaScript

For instructions on how to disable JavaScript in Firefox, please refer to the Firefox section of the Securing Your Web Browser document. JavaScript is not enabled by default in Mozilla Thunderbird.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Mozilla, Inc.Affected-01 Aug 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Mozilla for reporting this vulnerability. Mozilla in turn thanks shutdown.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2006-3810
  • Date Public: 25 Jul 2006
  • Date First Published: 01 Aug 2006
  • Date Last Updated: 09 Feb 2007
  • Severity Metric: 2.74
  • Document Revision: 14


If you have feedback, comments, or additional information about this vulnerability, please send us email.