Closed
Bug 721155
Opened 13 years ago
Closed 13 years ago
Persistent Cross Site Scripting in https://wiki.mozilla.org/ .
Categories
(Websites :: wiki.mozilla.org, defect)
Websites
wiki.mozilla.org
Tracking
(Not tracked)
RESOLVED
INVALID
People
(Reporter: netfuzzerr, Unassigned)
Details
User Agent: Mozilla/5.0 (Windows NT 6.1) AppleWebKit/535.19 (KHTML, like Gecko) Chrome/18.0.1017.2 Safari/535.19
Steps to reproduce:
Hello,
Tested on Windows 7 SP1
Firefox 9.01(using adobe reader plugin)
Screenshots:
1. https://wiki.mozilla.org/images/e/e9/Demo.png
2. https://wiki.mozilla.org/images/3/3c/Demo%282%29.png
Reproduce:
1. Go to https://wiki.mozilla.org/images/2/28/Exploitfile.pdf.
2. Click in "Click Here" image.
3. See your cookies.
@Michael Coates, I think this is "critical" because with only a click is possible get the user cookies. Will works like a persistent XSS.
Cheers,
Mario.
| Reporter | ||
Updated•13 years ago
|
Severity: normal → critical
| Reporter | ||
Updated•13 years ago
|
Status: UNCONFIRMED → RESOLVED
Closed: 13 years ago
Resolution: --- → INVALID
Updated•11 years ago
|
Group: websites-security
You need to log in
before you can comment on or make changes to this bug.
Description
•