Lucene search

K
mozillaMozilla FoundationMFSA2010-05
HistoryFeb 17, 2010 - 12:00 a.m.

XSS hazard using SVG document and binary Content-Type — Mozilla

2010-02-1700:00:00
Mozilla Foundation
www.mozilla.org
25

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.021

Percentile

89.3%

Mozilla security researcher Georgi Guninski reported that when a SVG document which is served with Content-Type: application/octet-stream is embedded into another document via an tag with type=“image/svg+xml”, the Content-Type is ignored and the SVG document is processed normally. A website which allows arbitrary binary data to be uploaded but which relies on Content-Type: application/octet-stream to prevent script execution could have such protection bypassed. An attacker could upload a SVG document containing JavaScript as a binary file to a website, embed the SVG document into a malicous page on another site, and gain access to the script environment from the SVG-serving site, bypassing the same-origin policy.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.0.18
OR
mozillafirefoxRange<3.5.8
OR
mozillafirefoxRange<3.6
OR
mozillaseamonkeyRange<2.0.3

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.021

Percentile

89.3%