{"vuid":"VU#143297","idnumber":"143297","name":"Mozilla Firefox allows cross-domain iframe access via JavaScript","keywords":["Mozilla","Firefox","IFRAME","cross-site scripting","xss","key logger","MFSA 2007-20","Mozilla_20070717"],"overview":"Mozilla Firefox allows cross-domain access to an iframe. This vulnerability could allow an attacker to interact with a web site in a different domain. The attacker could read content and cookies, capture keystrokes, and modify content.","clean_desc":"An iframe is an HTML element which allows an HTML document to be embedded inside a master HTML document. The Mozilla same origin policy states: The same origin policy prevents document or script loaded from one origin from getting or setting properties of a document from a different origin. The policy dates from Netscape Navigator 2.0. Mozilla considers two pages to have the same origin if the protocol, port (if given), and host are the same for both pages. Firefox does not properly enforce the same origin policy to web pages that use iframes. From Mozilla Bugzilla Bug ID 382686: The problem you fixed there is that document.write() could be used to overwrite frames that originate from Internet-based SRC= pointing to non-same-domain site. This is fixed and throws a security exception. Unfortunately, the check implemented means that about:blank frames can be overwritten freely; and unfortunately, *all* frames, even with Internet SRC= specified, will be vulnerable to a race condition while the document loads. Note that some websites that allow users to supply content may allow iframes to be included.","impact":"An attacker may be able to obtain sensitive data from a user, modify the appearance of a webpage or track keystrokes. Depending on the nature of the web site the user was visiting, this data may include passwords, credit card numbers, and any arbitrary information provided by the user.","resolution":"Mozilla has addressed this issue with Firefox 2.0.0.5. Please see Mozilla Foundation Security Advisory 2007-20 for details.","workarounds":"Workarounds for users\nDisable JavaScript (see Securing Your Web Browser). Use the NoScript Firefox Add-on to whitelist what sites can run JavaScript. Type in URLs directly in the web browser's address bar, or use bookmarks to navigate to websites. See the Cross-Site Scripting Vulnerabilities document for general information. Workarounds for administrators\nDo not allow user submitted content to include JavaScript. Do not allow users to submit content to a shared resource that includes iframes. A shared resource may include the comments section of a blog or a web forum. Monitor the content submitted by third parties for malicious JavaScript or iframes.","sysaffected":"","thanks":"This vulnerability was reported by Michal Zalewski on the Full-Disclosure mailing list.","author":"This document was written by Ryan Giobbi.","public":["http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0026.html","https://bugzilla.mozilla.org/show_bug.cgi?id=382686","http://www.w3schools.com/tags/tag_iframe.asp","http://www.w3.org/TR/html401/present/frames.html#h-16.5","https://addons.mozilla.org/en-US/firefox/addon/722","http://www.mozilla.org/projects/security/components/same-origin.html","http://www.cert.org/archive/pdf/cross_site_scripting.pdf","http://www.stopbadware.org/home/security#preventing","http://www.antiphishing.org/consumer_recs.html","http://www.mozilla.org/security/announce/2007/mfsa2007-20.html","http://secunia.com/advisories/26095/","http://secunia.com/advisories/26288/","http://www.us-cert.gov/reading_room/securing_browser/"],"cveids":["CVE-2007-3089"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-06-04T13:10:08Z","publicdate":"2007-06-04T00:00:00Z","datefirstpublished":"2007-06-08T17:28:14Z","dateupdated":"2008-03-14T16:50:35Z","revision":53,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"3","cam_widelyknown":"19","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"7","cam_easeofexploitation":"12","cam_attackeraccessrequired":"15","cam_scorecurrent":"8.505","cam_scorecurrentwidelyknown":"8.859375","cam_scorecurrentwidelyknownexploited":"15.946875","ipprotocol":"tcp","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.505,"vulnote":null}