Secunia Research has discovered a vulnerability in Mozilla, Firefox, and Camino, which can be exploited by malicious web sites to spoof dialog boxes. The problem is that JavaScript dialog boxes do not display or include their origin, which allows a new window to open e.g. a prompt dialog box, which appears to be from a trusted site. Successful exploitation normally requires that a user is tricked into opening a link from a malicious web site to a trusted web site. Secunia has constructed a test, which can be used to check if your browser is affected by this issue: http://secunia.com/multiple_browsers_dialog_origin_vulnerability_test/ The vulnerability has been confirmed in Mozilla 1.7.8, FireFox 1.04, and Camino 0.8.4. Prior versions may also be affected.
One more from Secunia I might consider INVALID... but if the Moz folks fix it, after all... A few pointers on that question : https://bugzilla.mozilla.org/show_bug.cgi?id=298407 https://bugzilla.mozilla.org/show_bug.cgi?id=123913#c19
This is : Mozilla Foundation Security Advisory 2005-54 Title: Javascript prompt origin spoofing Severity: Low Reporter: Secunia.com Products: Firefox, Mozilla Suite Fixed in: Firefox 1.0.5 Mozilla Suite 1.7.9 See bug 95199 and bug 98846 for followups *** This bug has been marked as a duplicate of 98846 ***