2009/12/3 Alan Woodland <alan.woodl...@gmail.com>:
> 2009/12/3 Giuseppe Iuculano <iucul...@debian.org>:
>> Package: firefox-sage
>> Severity: grave
>> Tags: security
>>
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>>
>> Hi,
>> the following CVE (Common Vulnerabilities & Exposures) id was
>> published for firefox-sage.
>>
>> CVE-2009-4102[0]:
>> | Sage 1.4.3 and earlier extension for Firefox performs certain
>> | operations with chrome privileges, which allows remote attackers to
>> | execute arbitrary commands and perform cross-domain scripting attacks
>> | via the description tag of an RSS feed.
>>
>> If you fix the vulnerability please also make sure to include the
>> CVE id in your changelog entry.
>>
>> For further information see:
>>
>> [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4102
>>    http://security-tracker.debian.org/tracker/CVE-2009-4102
>
> Hmm, I'll take a look at this this afternoon. It's possible we might
> not be hit by this one, last time there was an XSS bug I applied a
> patch that went further than upstream did.
>
Ho hum, I've so far not succeeded in finding a test case that exploits
this (safely). I thought the attached feed would break things, but
apparently not so far.

Alan
<?xml version="1.0" encoding="UTF-8"?>
<rss>
  <channel>
    <title>no title</title>
    <description><script>alert("hello world -  feed description");</script></description>
    <link>n/a</link>
    <lastBuildDate>n/a</lastBuildDate>
    <generator>RSS Writer</generator>
    <image><url>http://www.phelios.net</url><title>n/a</title><link>http://www.phelios.net</link><description>n/a</description></image>
  </channel>
  <item>
    <title>item title</title>
    <link>item link</link>
    <description>Test 1<script>alert("hello world -  item description");</script></description>
  </item>
</rss>

Reply via email to