First published: Mon Feb 26 2007(Updated: )
browser.js in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 uses the requesting URI to identify child windows, which allows remote attackers to conduct cross-site scripting (XSS) attacks by opening a blocked popup originating from a javascript: URI in combination with multiple frames having the same data: URI.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | >=1.5<1.5.0.10 | |
Mozilla Firefox | >=2.0<2.0.0.2 | |
Mozilla SeaMonkey | <1.0.8 | |
Ubuntu Linux | =5.10 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =6.10 | |
Ubuntu | =6.06 | |
Ubuntu | =6.10 | |
Ubuntu | =5.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0780 is rated as a moderate severity vulnerability, which could allow cross-site scripting attacks.
To fix CVE-2007-0780, upgrade to Mozilla Firefox version 1.5.0.10 or higher, Firefox 2.0.0.2 or higher, or SeaMonkey version 1.0.8 or higher.
CVE-2007-0780 affects Mozilla Firefox versions prior to 1.5.0.10 and 2.0.0.2, and SeaMonkey versions prior to 1.0.8.
Yes, CVE-2007-0780 can be exploited remotely by attackers to conduct cross-site scripting attacks.
Systems with Mozilla Firefox 1.5.x or 2.x before 2.0.0.2 and SeaMonkey before 1.0.8 are specifically vulnerable to CVE-2007-0780.