CVE-2009-3017

Orca Browser 1.2 build 5 does not properly block data: URIs in Refresh and Location headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header that contains JavaScript sequences in a data:text/html URI, (2) entering a data:text/html URI with JavaScript sequences when specifying the content of a Refresh header, (3) injecting a Location header that contains JavaScript sequences in a data:text/html URI, or (4) entering a data:text/html URI with JavaScript sequences when specifying the content of a Location header; and does not properly handle javascript: URIs in HTML links within 302 error documents sent from web servers, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (5) injecting a Location HTTP response header or (6) specifying the content of a Location HTTP response header.
Configurations

Configuration 1 (hide)

cpe:2.3:a:orcabrowser:orca_browser:1.2:*:*:*:*:*:*:*

History

21 Nov 2024, 01:06

Type Values Removed Values Added
References () http://websecurity.com.ua/3386/ - Exploit () http://websecurity.com.ua/3386/ - Exploit
References () http://www.securityfocus.com/archive/1/506163/100/0/threaded - () http://www.securityfocus.com/archive/1/506163/100/0/threaded -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/53002 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/53002 -

Information

Published : 2009-08-31 16:30

Updated : 2025-04-09 00:30


NVD link : CVE-2009-3017

Mitre link : CVE-2009-3017

CVE.ORG link : CVE-2009-3017


JSON object : View

Products Affected

orcabrowser

  • orca_browser
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')