Closed Bug 346664 Opened 18 years ago Closed 16 years ago

Arbitrary code execution with FireBug by using document.open or document.write

Categories

(Core :: Security, defect)

x86
Windows XP
defect
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: moz_bug_r_a4, Assigned: dveditz)

References

Details

(Keywords: fixed1.8.0.15, fixed1.8.1.5, Whiteboard: [sg:critical][firebug-p1])

Attachments

(2 files)

See also bug 344751.

When document.open, or document.write on a document that has finished loading,
is called by a script in a different security context, the document's principal
is set to the caller's principal.  In such case, if there are references to
objects/functions that were created in that document's context, then the
references also get the caller's principal.  This can be used to escalate
privilege in a similar way to bug 344751.
This does not work with the proposed patch in bug 344495 applied.
bug 344495 appears to be fixed.  wonder if we should close this bug?
Whiteboard: [firebug-p1]
I think that this bug is fixed.  Please see bug 346663 comment #4 and #5.
Marking FIXED based on last comment and testcases working.
Status: NEW → RESOLVED
Closed: 16 years ago
Resolution: --- → FIXED
Depends on: 332182, CVE-2007-3089
Flags: wanted1.8.1.x+
Whiteboard: [firebug-p1] → [sg:critical][firebug-p1]
Group: core-security
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Creator:
Created:
Updated:
Size: