Mozilla Cross-Site Scripting Vulnerability Reported and Fixed

Saturday February 28th, 2004

roseman wrote in to tell us about a cross-site scripting vulnerability in Mozilla, which was discovered and fixed in December last year. An advisory from Secunia refers to the flaw as "Less critical", while a SecurityTracker note gives more precise details of the bug, which could allow a malicious site to read another site's cookies or access other data recently submitted by the user. Both advisories note that a fix is available in Mozilla 1.6 Beta, though Secunia confusing also states that the issue has been patched in 1.4.2, which worried roseman as he could not find any links to this release. What Secunia should have said is that a fix for the flaw has been checked in to the 1.4 branch and that it will be available in Mozilla 1.4.2 when it is released.

The bug was handled in line with the Mozilla security bug policy, with reporter Andreas Sandblad emailing on December 2nd and members of the Mozilla security bug group filing a confidential bug report the next day (bug 227417). A fix was developed and checked in to both the trunk and the baseline 1.4 branch the same day. Sites such as Secunia and SecurityTracker only publicised the flaw after the bug report was opened to the public on Wednesday.

In this case, the vulnerability was relatively minor and a fix was applied before knowledge of it became widespread. It is not the sort of issue that MozillaZine would normally report on but we do so to address the concerns of worried users such as roseman and because it is a near-textbook example of the correct use of the Mozilla security bug policy.

#1 What about firefox?

by jsebrech

Sunday February 29th, 2004 2:12 AM

You are replying to this message

Is this fixed in firefox 0.8? Is firefox even affected (I assume so)? If it isn't fixed, when will it be?

Mozilla and the new separate apps really need a framework for updating part of the browser, so you could put out these security updates the day they are fixed, instead of having to wait for the next major release (which could take months, in true microsoft security fix style). I realise that if a really critical security bug was found, an interim release would be made to fix it, but still, a lot of people are on modem (for which mozilla and firefox are good browsers), and don't want to redownload the entire browser for just a small security fix, regardless of how critical it is.