{"vuid":"VU#911004","idnumber":"911004","name":"Mozilla Firefox fails to properly handle the \"XPCNativeWrapper(window).Function(...)\"","keywords":["Mozilla","Firefox","cross-site scripting","xss","code execution","XPCNativeWrapper(window).Function(...)","firefox_1505"],"overview":"Certain Mozilla products contain a cross-site scripting vulnerability because of a vulnerability in the XPCNativeWrapper function.","clean_desc":"XPCNativeWrapper Per Mozilla, XPCNativeWrapper is a way to wrap up an object so that it is safe to access from privileged code. It is used to allow chrome code to access DOM objects. The Problem An attacker can use the XPCNativeWrapper function to inject script into a browser window that may be in a different domain. This violates the Netscape same-origin policy.","impact":"By convincing a victim to view an HTML document (web page), an attacker could evaluate script in a different security domain than the one containing the attacker's document. The attacker could read or modify data in other web sites (read cookies/content, modify/create content, etc.). If the script is evaluated with chrome privileges, an attacker could execute arbitrary commands on the user's system.","resolution":"Upgrade\nThis issue is addressed in the 1.5.0.5 updates to Mozilla Firefox and Thunderbird, and the 1.0.3 version of Seamonkey. Refer to Mozilla Foundation Security Advisory 2006-54 for more details.","workarounds":"Disable JavaScript For instructions on how to disable JavaScript in Firefox, please refer to the Firefox section of the Securing Your Web Browser document. JavaScript is not enabled by default in Mozilla Thunderbird.","sysaffected":"","thanks":"Thanks to Mozilla for reporting this vulnerability. Mozilla in turn thanks \nshutdown.","author":"This document was written by Ryan Giobbi.","public":["http://www.mozilla.org/security/announce/2006/mfsa2006-54.html","https://bugzilla.mozilla.org/show_bug.cgi?id=338523","http://secunia.com/advisories/19873/","http://secunia.com/advisories/21216/","http://www.securityfocus.com/bid/19181"],"cveids":["CVE-2006-3810"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-07-27T14:15:12Z","publicdate":"2006-07-25T00:00:00Z","datefirstpublished":"2006-08-01T20:12:15Z","dateupdated":"2007-02-09T14:04:13Z","revision":15,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"1","cam_internetinfrastructure":"3","cam_population":"8","cam_impact":"10","cam_easeofexploitation":"6","cam_attackeraccessrequired":"16","cam_scorecurrent":"2.736","cam_scorecurrentwidelyknown":"3.456","cam_scorecurrentwidelyknownexploited":"6.192","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":2.736,"vulnote":null}