Mozilla Foundation Security Advisory 2009-09
XML data theft via RDFXMLDataSource and cross-domain redirect
- Announced
- March 4, 2009
- Reporter
- Georgi Guninski
- Impact
- High
- Products
- Firefox, SeaMonkey, Thunderbird
- Fixed in
-
- Firefox 3.0.7
- SeaMonkey 1.1.15
- Thunderbird 2.0.0.21
Description
Mozilla security researcher Georgi Guninski
reported that a website could use nsIRDFService
and a
cross-domain redirect to steal arbitrary XML data from another domain,
a violation of the same-origin policy. This vulnerability could be
used by a malicious website to steal private data from users
authenticated to the redirected website.
Thunderbird shares the browser engine with Firefox and could be vulnerable if JavaScript were to be enabled in mail. This is not the default setting and we strongly discourage users from running JavaScript in mail.
Workaround
Disable JavaScript until a version containing these fixes can be installed.