HTTP: Mozilla Java Script in IFRAME Src

This signature detects cross-site scripting attempts. Attackers can use an IFRAME tag, with maliciously crafted JavaScript code in the src parameter, to cause an input validation error.

Extended Description

Mozilla Firefox is prone to a security vulnerability that could result in the execution of arbitrary code without requiring user interaction. Initial analysis of the vulnerability reveals that the it relies on a three-stage attack that may lead to an arbitrary script gaining 'UniversalXPConnect' privileges. A remote atacker may be able to exploit this issue to take arbitrary actions on the vulnerable computer in the context of the user that is running the affcted browser. This vulnerability is reported in all versions of Mozilla Firefox browsers up to 1.0.3. To be exploitable, a site listed in a victim user's configuration to allow extension installation must be prone to a cross-site scripting vulnerability. By default, 'update.mozilla.org' and 'addon.mozilla.org' are both listed as trusted sites for extension installation. *Update: The cross-site scripting vulnerability that the publicly available exploit relied on in the mozilla.org domain has been fixed. This issue is no longer exploitable through this public attack vector.

Affected Products

Mozilla browser

Short Name
HTTP:STC:MOZILLA:IFRAME-SRC
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2005-1476 IFRAME Java Mozilla Script Src bid:13544 in
Release Date
05/09/2005
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Red_hat

Sco

Suse

Hp

Mozilla

Sgi

Ubuntu

Netscape

CVSS Score

5.1

Found a potential security threat?