New Search

Mozilla XML Attribute Name Validation Vulnerability

oval:org.mitre.oval:def:1493

The XULDocument.persist function in Mozilla Firefox before 1.5.0.1 and SeaMonkey before 1.0 does not validate the attribute name which allows remote attackers to execute arbitrary Javascript by injecting RDF data into the user's localstore.rdf file.

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows XP
  • Microsoft Windows NT
  • Microsoft Windows 2000
  • Microsoft Windows Server 2003
Class:
vulnerability
Reference(s):
  • CVE-2006-0296
Product(s):
  • mozilla