First published: Fri Dec 28 2007(Updated: )
The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 does not update the origin domain when retrieving the inner URL parameter yields an HTTP redirect, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI, a different vulnerability than CVE-2007-5947.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=2.0.0.9 | |
Mozilla SeaMonkey | <=1.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-6589 has a moderate severity as it allows cross-site scripting (XSS) attacks.
To fix CVE-2007-6589, update your Mozilla Firefox to version 2.0.0.10 or later, or SeaMonkey to version 1.1.7 or later.
Mozilla Firefox versions before 2.0.0.10 are affected by CVE-2007-6589.
SeaMonkey versions before 1.1.7 are affected by CVE-2007-6589.
CVE-2007-6589 enables attackers to conduct cross-site scripting (XSS) attacks.