First published: Wed Dec 17 2008(Updated: )
Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-controlled resource that uses a 302 redirect to a resource in a different domain, then reading content from the response, aka "response disclosure."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | >=2.0<2.0.0.19 | |
Mozilla Firefox | >=3.0<3.0.5 | |
Mozilla SeaMonkey | >=1.0<1.1.14 | |
Mozilla Thunderbird | >=2.0<2.0.0.19 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =7.10 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 | |
Debian GNU/Linux | =4.0 | |
Debian GNU/Linux | =5.0 | |
Mozilla Firefox and Thunderbird | >=2.0<2.0.0.19 | |
Mozilla Firefox and Thunderbird | >=3.0<3.0.5 | |
Mozilla Firefox and Thunderbird | >=2.0<2.0.0.19 | |
Ubuntu | =6.06 | |
Ubuntu | =7.10 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Debian | =5.0 | |
Debian | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5506 is classified as a high severity vulnerability due to its potential to allow attackers to bypass the same origin policy.
To fix CVE-2008-5506, users should update their Mozilla Firefox, Thunderbird, or SeaMonkey to the latest versions available.
CVE-2008-5506 affects Mozilla Firefox versions prior to 3.0.5, Thunderbird versions prior to 2.0.0.19, and SeaMonkey versions prior to 1.1.14.
CVE-2008-5506 can be exploited by remote attackers via a crafted XMLHttpRequest that leverages 302 redirects.
Exploitation of CVE-2008-5506 can lead to unauthorized access and data leakage due to bypassing the same origin policy.