Description
The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1797-1 | New xulrunner packages fix several vulnerabilities |
EUVD |
EUVD-2009-1304 | The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation. |
Ubuntu USN |
USN-764-1 | Firefox and Xulrunner vulnerabilities |
Ubuntu USN |
USN-782-1 | Thunderbird vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T05:04:49.503Z
Reserved: 2009-04-16T00:00:00.000Z
Link: CVE-2009-1306
No data.
Status : Modified
Published: 2009-04-22T18:30:00.280
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-1306
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN