Mozilla Cross-Site Scripting Vulnerability Reported and Fixed
Saturday February 28th, 2004
roseman wrote in to tell us about a cross-site scripting vulnerability in Mozilla, which was discovered and fixed in December last year. An advisory from Secunia refers to the flaw as "Less critical", while a SecurityTracker note gives more precise details of the bug, which could allow a malicious site to read another site's cookies or access other data recently submitted by the user. Both advisories note that a fix is available in Mozilla 1.6 Beta, though Secunia confusing also states that the issue has been patched in 1.4.2, which worried roseman as he could not find any links to this release. What Secunia should have said is that a fix for the flaw has been checked in to the 1.4 branch and that it will be available in Mozilla 1.4.2 when it is released.
The bug was handled in line with the Mozilla security bug policy, with reporter Andreas Sandblad emailing firstname.lastname@example.org on December 2nd and members of the Mozilla security bug group filing a confidential bug report the next day (bug 227417). A fix was developed and checked in to both the trunk and the baseline 1.4 branch the same day. Sites such as Secunia and SecurityTracker only publicised the flaw after the bug report was opened to the public on Wednesday.
In this case, the vulnerability was relatively minor and a fix was applied before knowledge of it became widespread. It is not the sort of issue that MozillaZine would normally report on but we do so to address the concerns of worried users such as roseman and because it is a near-textbook example of the correct use of the Mozilla security bug policy.
#2 a few points
Sunday February 29th, 2004 3:30 AM
You are replying to this message
1. Firebird 0.8 is not affected. You can tell by going to about in the help menu. rv:1.6 tells us that Firebird 0.8 is based on Mozilla 1.6. 2. 0.9 will feature "smartupdate". However, the Mozilla security team may choose not to use it. As scary as this is to Microsoft customers, it is in Mozilla's best interest to build the patch into a build and test for stability and so forth before simply rolling out a patch. Due to that reason, I would assume 1.4.2 will be out tommorow, and that the patch is checked into tonight's nightly builds. I am guessing on this. By the way, that only affects 1.4 builds. (you are not running a 1.4 build.) Note that 1.4.2 is a *minor* release. Mozilla would never wait for a major build unless it was iminent.
What we could use is: a) a Netscape update --> are Netscape builds affected? (Would anybody be willing to sue AOL class-action style for their ridiculous update policy? They are essentially knowingly shipping defective and outdated software.) b) a security detection page that asks the browser to identify itself and declares whether there are any secuity issues and how critical they are. This would fix some confusion.