
31/8/2009

16/9/2024
CVE-2009-3012: XSS
First published: Mon Aug 31 2009(Updated: )
Mozilla Firefox 3.0.13 and earlier, 3.5, 3.6 a1 pre, and 3.7 a1 pre does not properly block data: URIs in Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Location header that contains JavaScript sequences in a data:text/html URI or (2) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header. NOTE: the JavaScript executes outside of the context of the HTTP site.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|
Firefox | =3.0.7 | |
Firefox | =3.0.9 | |
Firefox | =3.0.8 | |
Firefox | =3.5 | |
Firefox | =3.0.4 | |
Firefox | =3.7-a1_pre | |
Firefox | <=3.0.13 | |
Firefox | =3.0.5 | |
Firefox | =3.6-a1_pre | |
Firefox | =3.0-beta2 | |
Firefox | =3.0.10 | |
Firefox | =3.0.12 | |
Firefox | =3.0.3 | |
Firefox | =3.0.6 | |
Firefox | =3.0 | |
Firefox | =3.0.1 | |
Firefox | =3.0.2 | |
Firefox | =3.0-beta5 | |
Firefox | =3.0-alpha | |
Firefox | =3.0.11 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2009-3012?
CVE-2009-3012 is classified as a moderate severity vulnerability due to its potential for cross-site scripting (XSS) attacks.
How do I fix CVE-2009-3012?
To fix CVE-2009-3012, upgrade Mozilla Firefox to version 3.0.14 or later to mitigate this vulnerability.
What versions of Mozilla Firefox are affected by CVE-2009-3012?
CVE-2009-3012 affects Mozilla Firefox versions 3.0.13 and earlier, as well as 3.5, 3.6 a1 pre, and 3.7 a1 pre.
What type of attack is associated with CVE-2009-3012?
CVE-2009-3012 is associated with cross-site scripting (XSS) attacks that can be performed through malicious Location headers.
Can CVE-2009-3012 be exploited remotely?
Yes, CVE-2009-3012 can be exploited remotely by attackers injecting malicious JavaScript into Location headers.
- agent/references
- agent/type
- agent/author
- agent/severity
- agent/description
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/first-publish-date
- agent/event
- agent/source
- agent/weakness
- agent/softwarecombine
- agent/tags
- collector/nvd-historical
- agent/software-canonical-lookup-request
- collector/nvd-index
- vendor/mozilla
- canonical/firefox
- version/firefox/3.0.7
- version/firefox/3.0.9
- version/firefox/3.0.8
- version/firefox/3.5
- version/firefox/3.0.4
- version/firefox/3.7-a1_pre
- version/firefox/3.0.13
- version/firefox/3.0.5
- version/firefox/3.6-a1_pre
- version/firefox/3.0-beta2
- version/firefox/3.0.10
- version/firefox/3.0.12
- version/firefox/3.0.3
- version/firefox/3.0.6
- version/firefox/3.0
- version/firefox/3.0.1
- version/firefox/3.0.2
- version/firefox/3.0-beta5
- version/firefox/3.0-alpha
- version/firefox/3.0.11
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203