header-logo
Suggest Exploit
vendor:
Firefox, Thunderbird, SeaMonkey
by:
SecurityFocus
8.8
CVSS
HIGH
Cross-Site Scripting
79
CWE
Product Name: Firefox, Thunderbird, SeaMonkey
Affected Version From: Firefox 2.0.0.14, Thunderbird 2.0.0.14, SeaMonkey 1.1.9
Affected Version To: Firefox 3.0.1, Thunderbird 2.0.0.14, SeaMonkey 1.1.9
Patch Exists: YES
Related CWE: CVE-2008-2798
CPE: o:mozilla:firefox
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2008

Mozilla Foundation Multiple Security Advisories

An attacker can exploit this vulnerability by crafting a malicious URL and sending it to a user. When the user visits the URL, the malicious script will be executed in the context of the vulnerable website, allowing the attacker to access the user's cookies and other sensitive information.

Mitigation:

Users should avoid following unsolicited links from untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/34656/info

The Mozilla Foundation has released multiple security advisories specifying various vulnerabilities in Firefox, Thunderbird, and SeaMonkey.

Attackers can exploit these issues to bypass same-origin restrictions, obtain potentially sensitive information, and execute arbitrary script code with elevated privileges; other attacks are also possible. 

With request to script at web site:

http://www.example.com/script.php?param=javascript:alert(document.cookie)

Which returns in answer the refresh header:

refresh: 0; URL=javascript:alert(document.cookie)