Bug 772690 - firefox: drag-and-drop handling same origin policy bypass flaw
Summary: firefox: drag-and-drop handling same origin policy bypass flaw
Keywords:
Status: CLOSED DUPLICATE of bug 803119
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 772692 798147
TreeView+ depends on / blocked
 
Reported: 2012-01-09 17:04 UTC by Vincent Danen
Modified: 2019-09-29 12:49 UTC (History)
3 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-03-14 06:13:13 UTC
Embargoed:


Attachments (Terms of Use)

Description Vincent Danen 2012-01-09 17:04:50 UTC
It was reported [1],[2] that Firefox suffers from a Drag-and-Drop XSS flaw.  This could allow for the execution of unwanted javascript by copying and pasting it in the address bar, or by dragging and dropping it onto a web page.  Two methods were identified: bypass via letter capitalization and another by use of the feed protocol (the latter does not seem to affect Firefox 3.6.x which reports that the URL is not valid and cannot be loaded).

The upstream bug is currently private and a fix is currently unavailable.

[1] http://soroush.secproject.com/blog/2011/12/drag-and-drop-xss-in-firefox-by-html5-cross-domain-in-frames/
[2] https://bugzilla.mozilla.org/show_bug.cgi?id=704354

Comment 3 Huzaifa S. Sidhpurwala 2012-03-14 06:13:13 UTC

*** This bug has been marked as a duplicate of bug 803119 ***


Note You need to log in before you can comment on or make changes to this bug.