Sage vulnerable to arbitrary script execution


Sage is vulnerable to arbitrary script execution.

Note that this vulnerability is different from JVN#99203127.

Sage is an addon for Mozilla Firefox that adds an RSS/Atom feed reader. Sage is vulnerable to arbitrary script execution due to the improper processing during HTML page output based on feed information.

Yosuke HASEGAWA of NetAgent Co.,Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 5.8 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: None

Affected Products

  • Sage versions 1.3.10 and earlier


An arbitrary script embedded in an RSS/Atom feed may be executed on the user's Mozilla Firefox.

[Update the software]
Update to the latest version according to the information provided by the developer.

[Apply a workaround]
Until an update can be applied, the workaround below may reduce the impact of this vulnerability:

* Uncheck the option for "Read feed into contents area" in Sage
Vendor Information

mozilla.org contributors
CWE (What is CWE?)

  1. Cross-site Scripting(CWE-79) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2011-3384

  1. JVN : JVN#30221194
  2. National Vulnerability Database (NVD) : CVE-2011-3384
Revision History

  Web page published