CVE-2007-6589

Current Description

The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.

Basic Data

PublishedDecember 28, 2007
Last ModifiedSeptember 29, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-79
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.3
SeverityMEDIUM
Exploitability Score8.6
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationMozillaFirefox********2.0.0.9
    2.3ApplicationMozillaSeamonkey********1.1.6

Vulnerable Software List

VendorProductVersions
Mozilla Firefox *
Mozilla Seamonkey *

References

NameSourceURLTags
http://blog.beford.org/?p=8http://blog.beford.org/?p=8MISC
SSRT061181http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742HP
43477http://osvdb.org/43477OSVDB
http://www.mozilla.org/security/announce/2007/mfsa2007-37.htmlhttp://www.mozilla.org/security/announce/2007/mfsa2007-37.htmlCONFIRM
ADV-2008-0083http://www.vupen.com/english/advisories/2008/0083VUPEN
https://bugzilla.mozilla.org/show_bug.cgi?id=369814https://bugzilla.mozilla.org/show_bug.cgi?id=369814CONFIRM
https://bugzilla.mozilla.org/show_bug.cgi?id=403331https://bugzilla.mozilla.org/show_bug.cgi?id=403331CONFIRM
oval:org.mitre.oval:def:6033https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6033OVAL