Rapid7 Vulnerability & Exploit Database

MFSA2005-36 Firefox: Cross-site scripting through global scope pollution

Back to Search

MFSA2005-36 Firefox: Cross-site scripting through global scope pollution

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
11/21/2013
Created
07/25/2018
Added
11/21/2013
Modified
01/30/2015

Description

As you browse from site to site each new page should start with a clean slate. shutdown reports a technique that pollutes the global scope of a window in a way that persists from page to page. A malicious script could define a setter function for a variable known to be used by a popular site, and if the user does browse to that site the malicious script will run in that page. This would allows the setter script to steal cookies or the contents of the page, or potentially perform actions on the user's behalf (such as make purchases or delete webmail) depending heavily on how the site was designed.The objects persist until the window or tab is closed.

Solution(s)

  • mozilla-firefox-upgrade-1_0_3

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;