The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2009-04-22T18:00:00
Updated: 2024-08-07T05:04:49.503Z
Reserved: 2009-04-16T00:00:00
Link: CVE-2009-1306
Vulnrichment
No data.
NVD
Status : Modified
Published: 2009-04-22T18:30:00.280
Modified: 2024-11-21T01:02:09.153
Link: CVE-2009-1306
Redhat