Mozilla Foundation Security Advisory 2008-61
Information stealing via loadBindingDocument
- Announced
- December 16, 2008
- Reporter
- Boris Zbarsky
- Impact
- Moderate
- Products
- Firefox, SeaMonkey, Thunderbird
- Fixed in
-
- Firefox 2.0.0.19
- SeaMonkey 1.1.14
- Thunderbird 2.0.0.19
Description
Mozilla developer Boris Zbarsky reported that XBL bindings could be used to read data from other domains, a violation of the same-origin policy. The severity of this issue was determined to be moderate due to several mitigating factors:
- The target document requires a
<bindings>
element in the XBL namespace in order to be read. - The reader of the data needs to know the
id
attribute of the binding being read in advance. - It is unlikely that web services will expose private data in the manner described above.
Firefox 3 is not affected by this issue.
Thunderbird shares the browser engine with Firefox and could be vulnerable if JavaScript were to be enabled in mail. This is not the default setting and we strongly discourage users from running JavaScript in mail.
Workaround
Products built from the Mozilla 1.9.0 branch and later, Firefox 3 for example, are not affected by this issue. Upgrading to one of these products is a reliable workaround for this particular issue and it is also Mozilla's recommendation that the most current version of any Mozilla product be used. Alternatively, you can disable JavaScript until a version containing these fixes can be installed.