Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 397943 - www-client/firefox{,-bin} Drag and Drop Handling Same Origin Policy Bypass Vulnerability
Summary: www-client/firefox{,-bin} Drag and Drop Handling Same Origin Policy Bypass Vu...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/47400/
Whiteboard: A3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2012-01-06 23:46 UTC by Michael Harrison
Modified: 2013-08-27 21:18 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Michael Harrison 2012-01-06 23:46:42 UTC
The vulnerability is caused due to an error when handling drag and drop events and can be exploited to bypass the same origin policy and e.g. execute script code in the context of another domain.

The vulnerability is confirmed in version 9.0.1. Other versions may also be affected.

Solution
Do not perform suspicious actions on untrusted web sites.

Original Advisory:
http://soroush.secproject.com/blog/2011/12/drag-and-drop-xss-in-firefox-by-html5-cross-domain-in-frames/
Comment 1 Jory A. Pratt gentoo-dev 2012-02-13 01:18:16 UTC
Please do not add us to a security bug, if upstream has not made a release with a fix or a patch is unavailable. This creates undesired noise in our in boxes.
Comment 2 Alex Legler (RETIRED) archtester gentoo-dev Security 2012-02-13 19:51:59 UTC
(In reply to comment #1)
> Please do not add us to a security bug, if upstream has not made a release with
> a fix or a patch is unavailable. This creates undesired noise in our in boxes.

NACK. Maintainers are CC'd onto bugs when filed/wrangled, as per our procedures [1]. Making exceptions for single teams is not acceptable.

[1] http://www.gentoo.org/security/en/vulnerability-policy.xml#doc_chap3
Comment 3 Jory A. Pratt gentoo-dev 2013-06-27 03:32:01 UTC
(In reply to Alex Legler from comment #2)
> (In reply to comment #1)
> > Please do not add us to a security bug, if upstream has not made a release with
> > a fix or a patch is unavailable. This creates undesired noise in our in boxes.
> 
> NACK. Maintainers are CC'd onto bugs when filed/wrangled, as per our
> procedures [1]. Making exceptions for single teams is not acceptable.
> 
> [1] http://www.gentoo.org/security/en/vulnerability-policy.xml#doc_chap3

This issue has been fixed for a while, it appears it been forgotten about by the security team, please close bug.
Comment 4 Chris Reffett (RETIRED) gentoo-dev Security 2013-08-27 21:18:26 UTC
Okay then. 9.0.1 is far too old to need a GLSA, closing.