[Japanese]
|
JVNDB-2011-000069
|
Sage vulnerable to arbitrary script execution
|
Sage is vulnerable to arbitrary script execution.
Note that this vulnerability is different from JVN#99203127.
Sage is an addon for Mozilla Firefox that adds an RSS/Atom feed reader. Sage is vulnerable to arbitrary script execution due to the improper processing during HTML page output based on feed information.
Yosuke HASEGAWA of NetAgent Co.,Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V2 Severity: Base Metrics 5.8 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Medium
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: Partial
- Availability Impact: None
|
|
Sage
- Sage versions 1.3.10 and earlier
|
|
An arbitrary script embedded in an RSS/Atom feed may be executed on the user's Mozilla Firefox.
|
[Update the software]
Update to the latest version according to the information provided by the developer.
[Apply a workaround]
Until an update can be applied, the workaround below may reduce the impact of this vulnerability:
* Uncheck the option for "Read feed into contents area" in Sage
|
mozilla.org contributors
|
- Cross-site Scripting(CWE-79) [IPA Evaluation]
|
- CVE-2011-3384
|
- JVN : JVN#30221194
- National Vulnerability Database (NVD) : CVE-2011-3384
|
- [2011/09/02]
Web page published
|