Upstream information
Description
The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 4.3 | 
| Vector | AV:N/AC:M/Au:N/C:N/I:P/A:N | 
| Access Vector | Network | 
| Access Complexity | Medium | 
| Authentication | None | 
| Confidentiality Impact | None | 
| Integrity Impact | Partial | 
| Availability Impact | None | 
SUSE Security Advisories:
- SUSE-SA:2007:066, published Wed, 05 Dec 2007 15:00:00 +0000
 
SUSE Timeline for this CVE
CVE page created: Tue Jul 9 16:35:09 2013CVE page last modified: Mon Oct 6 18:15:07 2025