Mozilla Firefox 3.0.13 and previous versions, 3.5, 3.6 a1 pre, and 3.7 a1 pre does not properly block data: URIs in Location headers in HTTP responses, which allows remote malicious users to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Location header that contains JavaScript sequences in a data:text/html URI or (2) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header. NOTE: the JavaScript executes outside of the context of the HTTP site.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox 3.0.10 |
||
mozilla firefox 3.0.6 |
||
mozilla firefox 3.0.4 |
||
mozilla firefox 3.0 |
||
mozilla firefox 3.0.1 |
||
mozilla firefox 3.0.11 |
||
mozilla firefox 3.0.9 |
||
mozilla firefox 3.5 |
||
mozilla firefox 3.7 |
||
mozilla firefox 3.0.12 |
||
mozilla firefox 3.0.2 |
||
mozilla firefox 3.0.7 |
||
mozilla firefox 3.0.8 |
||
mozilla firefox 3.0.3 |
||
mozilla firefox 3.0.5 |
||
mozilla firefox |
||
mozilla firefox 3.6 |