Lucene search

K
mozillaMozilla FoundationMFSA2006-34
HistoryJun 01, 2006 - 12:00 a.m.

XSS viewing javascript: frames or images from context menu — Mozilla

2006-06-0100:00:00
Mozilla Foundation
www.mozilla.org
16

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.376

Percentile

97.2%

Paul Nickerson demonstrated that if an attacker could convince a user to right-click on a broken image and choose “View Image” from the context menu then he could get javascript to run on a site of the attacker’s choosing by making the image src attribute a javascript: URL and loading the target site on mousedown. This could be used to steal login cookies or other confidential information from the target site.

Affected configurations

Vulners
Node
mozillafirefoxRange<1.5.0.4
OR
mozillaseamonkeyRange<1.0.2
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.376

Percentile

97.2%