A vulnerability has been discovered in the Sage extension for Firefox, which can be exploited by malicious people to compromise a user's system.
Input passed via the "description" tag within RSS feeds is not properly sanitised before being used to render content. This can be exploited to execute arbitrary script code within the "chrome:" context and e.g. execute arbitrary commands on a user's system when a user visits a specially crafted web page or follows a specially crafted link.
The vulnerability is confirmed in version 1.4.3. Other versions may also be affected.
Solution: Update to version 1.4.6.
Provided and/or discovered by: Roberto Suggi Liverani and Nick Freeman
Original Advisory: http://code.google.com/p/sage/issues/detail?id=2
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org