Mozilla Foundation Security Advisory 2006-72
XSS by setting img.src to javascript: URI
- Announced
- December 19, 2006
- Reporter
- moz_bug_r_a4
- Impact
- High
- Products
- Firefox, SeaMonkey, Thunderbird
- Fixed in
-
- Firefox 1.5.0.9
- Firefox 2.0.0.1
- SeaMonkey 1.0.7
- Thunderbird 1.5.0.9
Description
moz_bug_r_a4 reported that the src
attribute of an IMG
element loaded in a frame could be changed to a javascript: URI that was able
to bypass the protections against cross-site script (XSS) injection.
The injected script could steal credentials and financial data, or perform
destructive actions on behalf of a logged-in user.
Workaround
Disable JavaScript until you can upgrade to a fixed version.
References
Exploit details withheld until after the active update period.