CVE-2010-1585
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
28/04/2010
Last modified:
11/04/2025
Description
The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFragmentSink protection mechanism in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 does not properly sanitize HTML in a chrome document, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* | 2.0.11 (including) | |
| cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://downloads.avaya.com/css/P8/documents/100133195
- http://wizzrss.blat.co.za/2009/11/17/so-much-for-nsiscriptableunescapehtmlparsefragment/
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A041
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A042
- http://www.mozilla.org/security/announce/2011/mfsa2011-08.html
- http://www.security-assessment.com/files/whitepapers/Cross_Context_Scripting_with_Firefox.pdf
- http://www.securityfocus.com/archive/1/510883/100/0/threaded
- https://bugzilla.mozilla.org/show_bug.cgi?id=562547
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12532
- http://downloads.avaya.com/css/P8/documents/100133195
- http://wizzrss.blat.co.za/2009/11/17/so-much-for-nsiscriptableunescapehtmlparsefragment/
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A041
- http://www.mandriva.com/security/advisories?name=MDVSA-2011%3A042
- http://www.mozilla.org/security/announce/2011/mfsa2011-08.html
- http://www.security-assessment.com/files/whitepapers/Cross_Context_Scripting_with_Firefox.pdf
- http://www.securityfocus.com/archive/1/510883/100/0/threaded
- https://bugzilla.mozilla.org/show_bug.cgi?id=562547
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12532



