The jar protocol handler in Mozilla Firefox prior to 2.0.0.10 and SeaMonkey prior to 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote malicious users to conduct cross-site scripting (XSS) attacks via a jar: URI.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox 2.0.0.4 |
||
mozilla firefox 2.0.0.5 |
||
mozilla seamonkey 1.1.3 |
||
mozilla seamonkey 1.1.2 |
||
mozilla firefox 2.0.0.6 |
||
mozilla firefox 2.0.0.7 |
||
mozilla firefox 2.0.0.8 |
||
mozilla seamonkey 1.1.1 |
||
mozilla firefox 2.0.0.1 |
||
mozilla firefox |
||
mozilla seamonkey |
||
mozilla firefox 2.0.0.2 |
||
mozilla firefox 2.0.0.3 |
||
mozilla seamonkey 1.1.5 |
||
mozilla seamonkey 1.1.4 |