{"vuid":"VU#319464","idnumber":"319464","name":"The Wizz RSS Reader chrome access vulnerability","keywords":["Wizz RSS Reader","INFO#111001"],"overview":"The Wizz RSS Reader contains a vulnerability that may allow an attacker to take any action that Mozlla Firefox can take.","clean_desc":"The Mozilla Firefox user interface components outside of the content area are created using chrome. This includes toolbars, menu bars, progress bars, and window title bars. Chrome provides content, locale, and skin information for the user interface. The Wizz RSS reader is an extension to Mozilla Firefox that searches and displays RSS feeds. The Wizz RSS Reader reader contains a vulnerability. This vulnerability occurs because The Wizz allows javascript in an RSS feed's DOM to be executed in the context of the Wizz RSS Reader's chrome window. Note that to exploit this vulnerability an attacker would have to convince a user to load a specially crafted RSS feed using The Wizz.","impact":"A remote unauthenticated attacker may be able to take any action that Mozilla Firefox is capable of performing. This includes downloading arbitrary files, redirecting browser requests, and accessing stored passwords.","resolution":"Upgrade\nVersion 2.1.9 of the Wizz RSS reader has been released to address this vulnerability. Users are encouraged to update to version 2.1.9 as soon as possible.","workarounds":"","sysaffected":"","thanks":"Thanks to the N-CIRT Lab for reporting this vulnerability.","author":"This document was written by Ryan Giobbi.","public":["https://addons.mozilla.org/en-US/firefox/addon/424","http://www.mozilla.org/xpfe/ConfigChromeSpec.html","http://www.w3.org/DOM/","http://en.wikipedia.org/wiki/Document_Object_Model","http://secunia.com/advisories/24913/"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-01-19T14:06:38Z","publicdate":"2007-04-13T00:00:00Z","datefirstpublished":"2007-04-16T18:16:35Z","dateupdated":"2007-04-17T13:49:42Z","revision":23,"vrda_d1_directreport":"1","vrda_d1_population":"1","vrda_d1_impact":"4","cam_widelyknown":"8","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"4","cam_impact":"18","cam_easeofexploitation":"20","cam_attackeraccessrequired":"11","cam_scorecurrent":"3.267","cam_scorecurrentwidelyknown":"6.831","cam_scorecurrentwidelyknownexploited":"12.771","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"ND","cvss_reportconfidence":"ND","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":3.267,"vulnote":null}