Cross-zone scripting vulnerability in the DOM templates (domplates) used by the console.log function in the Firebug extension before 1.03 for Mozilla Firefox allows remote attackers to bypass zone restrictions, read arbitrary file:// URIs, or execute arbitrary code in the browser chrome, as demonstrated via the runFile function, related to lack of HTML escaping in the property name.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://larholm.com/2007/04/06/0day-vulnerability-in-firebug/ - | |
References | () http://secunia.com/advisories/24743 - Vendor Advisory | |
References | () http://securityreason.com/securityalert/2525 - | |
References | () http://www.getfirebug.com/blog/2007/04/04/security-update/ - Patch | |
References | () http://www.gnucitizen.org/blog/firebug-goes-evil - Exploit | |
References | () http://www.securityfocus.com/archive/1/464740/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/464786/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/23315 - Exploit | |
References | () http://www.vupen.com/english/advisories/2007/1272 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33451 - |
Information
Published : 2007-04-06 00:19
Updated : 2025-04-09 00:30
NVD link : CVE-2007-1878
Mitre link : CVE-2007-1878
CVE.ORG link : CVE-2007-1878
JSON object : View
Products Affected
parakey_inc.
- firebug
CWE