The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Firefox: script execution via a bookmark

Synthesis of the vulnerability 

An attacker can invite user to bookmark an uri of type "data:" in order to execute Javascript code in the context of another website.
Impacted software: Firefox, SeaMonkey.
Severity of this computer vulnerability: 1/4.
Creation date: 22/02/2007.
Références of this announce: 371179, BID-22666, CVE-2007-1084, VIGILANCE-VUL-6580.

Description of the vulnerability 

A bookmarklet is an uri of "javascript:" type stored in user bookmarks. When user clicks on a bookmarklet, its code is run. As a security measure, user has to voluntarily copy-paste a "javascript:" uri to bookmark it.

A uri of type "data:" can contain HTML data. For example:
  data:text/html;<body><script ...
This type of uri therefore also permits to execute code, like "javascript:" uris.

However, user can be invited to add this uri easily by pressing Control-D.

When user will click on this bookrmark, the Javascript code it contains will be executed in the context of the current web site (displayed in the browser).
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This threat bulletin impacts software or systems such as Firefox, SeaMonkey.

Our Vigil@nce team determined that the severity of this computer threat bulletin is low.

The trust level is of type confirmed by a trusted third party, with an origin of internet server.

An attacker with a expert ability can exploit this computer threat.

Solutions for this threat 

Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a computers vulnerabilities patch. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.