Secunia Research: Mozilla / Firefox Property Manipulation Cross-Site Scripting

======================================================================

                     Secunia Research 13/07/2005

   - Mozilla / Firefox Property Manipulation Cross-Site Scripting -

======================================================================
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

======================================================================
1) Affected Software

Mozilla Firefox 1.0.4
Mozilla Suite 1.7.8

Other versions may also be affected.

======================================================================
2) Severity

Rating: Moderately critical
Impact: Cross-site scripting
Where:  From remote

======================================================================
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in Mozilla Suite and 
Firefox, which can be exploited by malicious people to conduct 
cross-site scripting attacks.

The problem is that the "frames", "parent", "self" and "top" DHTML
properties are not properly protected from being modified by another 
site via JavaScript. This can be exploited to execute arbitrary HTML 
and script code in a user's browser session in context of an arbitrary 
site, which calls a method in one of the modified properties.

The vulnerability has been confirmed in Firefox 1.0.4 and 
Mozilla Suite 1.7.8. Other versions may also be affected.

======================================================================
4) Solution

Mozilla Firefox:
Update to version 1.0.5.
http://www.mozilla.org/products/firefox/

Mozilla:
Disable JavaScript support.

The vulnerability has been fixed in the CVS repository and will be 
included in the upcoming 1.7.9 release.

======================================================================
5) Time Table

31/05/2005 - Vendor notified.
06/06/2005 - Vendor confirms the vulnerability.
22/06/2005 - Vulnerability fixed in the CVS repository.
12/07/2005 - Firefox 1.0.5 released.
13/07/2005 - Public disclosure.

======================================================================
6) Credits

Discovered by Andreas Sandblad, Secunia Research.

======================================================================
7) References

Mozilla:
http://www.mozilla.org/security/announce/mfsa2005-52.html

======================================================================
8) About Secunia

Secunia collects, validates, assesses, and writes advisories regarding
all the latest software vulnerabilities disclosed to the public. These
advisories are gathered in a publicly available database at the
Secunia web site:

http://secunia.com/

Secunia offers services to our customers enabling them to receive all
relevant vulnerability information to their specific system
configuration.

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

======================================================================
9) Verification

Please verify this advisory by visiting the Secunia web site:
http://secunia.com/secunia_research/2005-15/advisory/

Complete list of vulnerability reports released by Secunia Research:
http://secunia.com/secunia_research/

=====================================================================