CVE-2007-5947
Published: 14 November 2007
The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.
Priority
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
dapper |
Released
(1.5.dfsg+1.5.0.14~prepatch071125a-0ubuntu1)
|
edgy |
Released
(2.0.0.10+0nobinonly-0ubuntu0.6.10)
|
|
feisty |
Released
(2.0.0.10+1nobinonly-0ubuntu1)
|
|
gutsy |
Released
(2.0.0.10+2nobinonly-0ubuntu1.7.10.1)
|
|
upstream |
Released
(2.0.0.10)
|