DescriptionThe jar protocol handler in Mozilla Firefox before 184.108.40.206 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
|National Vulnerability Database|
SUSE Security Advisories:
- SUSE-SA:2007:066, published Wed, 05 Dec 2007 15:00:00 +0000
SUSE Timeline for this CVECVE page created: Tue Jul 9 16:35:09 2013
CVE page last modified: Fri Oct 7 12:45:38 2022