Bug 578155 (CVE-2010-0179) - CVE-2010-0179 Firefox Arbitrary code execution with Firebug XMLHttpRequestSpy
Summary: CVE-2010-0179 Firefox Arbitrary code execution with Firebug XMLHttpRequestSpy
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2010-0179
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2010-03-30 12:21 UTC by Josh Bressers
Modified: 2019-09-29 12:36 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-06-05 06:29:19 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2010:0332 0 normal SHIPPED_LIVE Critical: firefox security update 2010-03-30 23:28:54 UTC

Description Josh Bressers 2010-03-30 12:21:59 UTC
Mozilla security researcher moz_bug_r_a4 reported that the
XMLHttpRequestSpy module in the Firebug add-on was exposing an underlying
chrome privilege escalation vulnerability. When the XMLHttpRequestSpy
object was created, it would attach various properties of itself to objects
defined in web content which were not being properly wrapped to prevent
their exposure to chrome privileged objects. This could result in an
attacker running arbitrary JavaScript on a victim's machine, though it
required the victim to have Firebug installed.

Comment 1 Josh Bressers 2010-03-30 20:50:40 UTC
This is now public
http://www.mozilla.org/security/announce/2010/mfsa2010-21.html

Comment 2 errata-xmlrpc 2010-03-30 23:29:07 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 4

Via RHSA-2010:0332 https://rhn.redhat.com/errata/RHSA-2010-0332.html


Note You need to log in before you can comment on or make changes to this bug.