Closed
Bug 721155
Opened 12 years ago
Closed 12 years ago
Persistent Cross Site Scripting in https://wiki.mozilla.org/ .
Categories
(Websites :: wiki.mozilla.org, defect)
Websites
wiki.mozilla.org
Tracking
(Not tracked)
RESOLVED
INVALID
People
(Reporter: netfuzzerr, Unassigned)
Details
User Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1017.2 Safari/535.19 Steps to reproduce: Hello, Tested on Windows 7 SP1 Firefox 9.01(using adobe reader plugin) Screenshots: 1. https://wiki.mozilla.org/images/e/e9/Demo.png 2. https://wiki.mozilla.org/images/3/3c/Demo%282%29.png Reproduce: 1. Go to https://wiki.mozilla.org/images/2/28/Exploitfile.pdf. 2. Click in "Click Here" image. 3. See your cookies. @Michael Coates, I think this is "critical" because with only a click is possible get the user cookies. Will works like a persistent XSS. Cheers, Mario.
Reporter | ||
Updated•12 years ago
|
Severity: normal → critical
Reporter | ||
Updated•12 years ago
|
Status: UNCONFIRMED → RESOLVED
Closed: 12 years ago
Resolution: --- → INVALID
Updated•10 years ago
|
Group: websites-security
You need to log in
before you can comment on or make changes to this bug.
Description
•