{"vuid":"VU#715737","idnumber":"715737","name":"Mozilla-based browsers jar: URI cross-site scripting vulnerability","keywords":["jar","cross-site scripting","xss","INFO#111001","firefox","seamonkey"],"overview":"Mozilla-based web browsers including Firefox contain a vulnerability that may allow an attacker to execute code, or conduct cross-site scripting attacks.","clean_desc":"The jar: protocol is designed to extract content from ZIP compressed files. Mozilla-based browsers include support for jar: URIs that are of the form jar:[url]![/path/to/file.ext]. The compressed file does not need to have a .zip extension. From the GNUCITIZEN blog: jar: content run within the scope/origin of the secondary URL. Therefore, a URL like this: jar:https:// example.com/test.jar!/t.htm, will render a page which executes within the origin of https://example.com. Since the script in the webpage at the second URL runs in the context of the first URL's page, a cross-site scripting vulnerability occurs. To successfully exploit this vulnerability, an attacker could place or link to a specially crafted archive file on a site and convince the user to open the file with a Mozilla based browser. An attacker could use sites that allow user-submitted content distribute malicious archived files.","impact":"This vulnerability may allow an attacker to execute cross-site scripting attacks on sites that allow users to upload pictures, archives, or other files.","resolution":"This vulnerability is addressed in Mozilla Firefox 2.0.0.10:  From MFSA 2007-37: Support for the jar: URI scheme has been restricted to files served with a Content-Type header of application/java-archive or application/x-jar. Web applications that require signed pages must make sure their .jar archives are served with this Content-Type. Sites that allow users to upload binary files should make sure they do not allow these files to have one of these two MIME types.","workarounds":"Workarounds for network administrators and users\nNoScript version 1.1.7.8 and later may prevent this vulnerability from being exploited. Workarounds for website administrators\nBlocking URIs that contain  jar: using a reverse proxy or application firewall could prevent an attacker from uploading content that could exploit website visitors. Website owners who accept user supplied content may wish to serve these files from \"safe\" domains, such as numbered IP addresses or sub-level domains that can not access sensitive information.","sysaffected":"","thanks":"This vulnerability was disclosed by PDP on the \nGNUCITIZEN\n website.","author":"This document was written by Ryan Giobbi.","public":["http://www.gnucitizen.org/blog/web-mayhem-firefoxs-jar-protocol-issues","http://www.mozilla.org/security/announce/2007/mfsa2007-37.html","https://bugzilla.mozilla.org/show_bug.cgi?id=369814","http://www.gnucitizen.org/blog/severe-xss-in-google-and-others-due-to-the-jar-protocol-issues","https://bugzilla.mozilla.org/show_bug.cgi?id=403331","http://noscript.net/getit#devel","http://www.mozilla.org/projects/security/components/same-origin.html"],"cveids":["CVE-2007-5947"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-11-08T12:36:36Z","publicdate":"2007-11-07T00:00:00Z","datefirstpublished":"2007-11-08T20:48:09Z","dateupdated":"2008-11-20T16:16:20Z","revision":36,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"20","cam_exploitation":"5","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"10","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"29.53125","cam_scorecurrentwidelyknown":"29.53125","cam_scorecurrentwidelyknownexploited":"42.1875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":29.53125,"vulnote":null}