The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2009-04-22T18:00:00
Updated: 2018-10-03T20:57:01
Reserved: 2009-04-16T00:00:00
Link: CVE-2009-1306
JSON object: View
NVD Information
Status : Modified
Published: 2009-04-22T18:30:00.280
Modified: 2018-10-03T21:59:44.387
Link: CVE-2009-1306
JSON object: View
Redhat Information
No data.
CWE