CVE-2009-3010
Publication date 31 August 2009
Last updated 24 July 2024
Ubuntu priority
Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre; SeaMonkey 1.1.17; and Mozilla 1.7.x and earlier do not properly block data: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI or (2) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header. NOTE: in some product versions, the JavaScript executes outside of the context of the HTTP site.
Status
Package | Ubuntu Release | Status |
---|---|---|
firefox | ||
seamonkey | ||
xulrunner-1.9 | ||
xulrunner-1.9.1 | ||
Notes
jdstrand
'firefox' source package on Ubuntu 8.04 LTS uses xulrunner 1.8.1 which is not-affected per upstream: "Furthermore nome of the bugs you have referenced are XSS. JavaScript executing within the context of the site that served it is not cross-site anything."