Upstream information
Description
Mozilla Firefox executes DOM calls in response to a javascript: URI in the target attribute of a submit element within a form contained in an inline PDF file, which might allow remote attackers to bypass intended Adobe Acrobat JavaScript restrictions on accessing the document object, as demonstrated by a web site that permits PDF uploads by untrusted users, and therefore has a shared document.domain between the web site and this javascript: URI. NOTE: the researcher reports that Adobe's position is "a PDF file is active content."SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having critical severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 9.3 | 
| Vector | AV:N/AC:M/Au:N/C:C/I:C/A:C | 
| Access Vector | Network | 
| Access Complexity | Medium | 
| Authentication | None | 
| Confidentiality Impact | Complete | 
| Integrity Impact | Complete | 
| Availability Impact | Complete | 
SUSE Timeline for this CVE
CVE page created: Tue Jul 9 16:32:10 2013CVE page last modified: Mon Oct 6 18:15:47 2025