Mozilla security researcher moz_bug_r_a4 reported that the wrapper class XPCSafeJSObjectWrapper (SJOW) on the Mozilla 1.9.1 development branch has a logical error in its scripted function implementation that allows the caller to run the function within the context of another site. This is a violation of the same-origin policy and could be used to mount an XSS attack. Upstream advisory: [1] http://www.mozilla.org/security/announce/2010/mfsa2010-60.html Upstream bug report (not public yet): [2] https://bugzilla.mozilla.org/show_bug.cgi?id=585284
This flaw only affected the 3.5 Firefox branch. I'm closing it as CURRENTRELEASE as it's fixed everywhere we ship Firefox.