Closed
Bug 296489
Opened 20 years ago
Closed 20 years ago
chrome XBL allows arbitrary code execution
Categories
(Core :: XBL, defect)
Tracking
()
RESOLVED
DUPLICATE
of bug 296397
People
(Reporter: sync2d, Unassigned)
Details
(Whiteboard: [sg:dupe 296397])
Attachments
(1 file)
1005 bytes,
text/html
|
Details |
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Build Identifier: Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.7.8) Gecko/20050511 Firefox/1.0.4
Any non-privileged web pages can use XBL bindings stored in the
chrome directory (e.g. chrome://xbl-marquee/content/xbl-marquee.xml).
These XBL bindings expose some methods as its bound element's methods,
and and these methods expose the privileged Function() constructor.
Therefore, the attacker can execute arbitrary code with chrome privileges.
Reproducible: Always
Steps to Reproduce:
1. load the testcase.
2. follow "invoke an exploit" link.
Actual Results:
The testcase alerts "[object nsXPCComponents_Classes]".
Expected Results:
Permission denied to access Components.classes.
the testcase. works in firefox 1.0.4 and firefox trunk.
Mozilla/5.0 (Windows; U; Win98; en-US; rv:1.8b2) Gecko/20050602 Firefox/1.0+
![]() |
||
Comment 2•20 years ago
|
||
*** This bug has been marked as a duplicate of 296397 ***
Status: UNCONFIRMED → RESOLVED
Closed: 20 years ago
Resolution: --- → DUPLICATE
Updated•20 years ago
|
Whiteboard: [sg:dupe 296397]
Updated•20 years ago
|
Group: security
You need to log in
before you can comment on or make changes to this bug.
Description
•