Vulnerability Name:

CVE-2007-5947 (CCN-38356)

Assigned:2007-02-08
Published:2007-02-08
Updated:2018-10-15
Summary:The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Full-Disclosure Mailing List, Thu Nov 08 2007 - 18:16:45 CST
JAR: protocol vulnerability in Firefox, word processing applications reported

Source: CONFIRM
Type: UNKNOWN
http://browser.netscape.com/releasenotes/

Source: CCN
Type: Netscape Web site
Release Notes: What's New in Netscape Navigator 9.0.0.4

Source: MISC
Type: UNKNOWN
http://bugs.gentoo.org/show_bug.cgi?id=198965

Source: MISC
Type: UNKNOWN
http://bugs.gentoo.org/show_bug.cgi?id=200909

Source: MITRE
Type: CNA
CVE-2007-5947

Source: MITRE
Type: CNA
CVE-2007-6589

Source: HP
Type: UNKNOWN
HPSBUX02153

Source: SUSE
Type: UNKNOWN
SUSE-SA:2007:066

Source: CCN
Type: RHSA-2007-1082
Critical: firefox security update

Source: CCN
Type: RHSA-2007-1083
Moderate: thunderbird security update

Source: CCN
Type: RHSA-2007-1084
Critical: seamonkey security update

Source: CCN
Type: SA27605
Mozilla Firefox "jar:" Protocol Handling Cross-Site Scripting Security Issue

Source: SECUNIA
Type: Vendor Advisory
27605

Source: SECUNIA
Type: Vendor Advisory
27793

Source: SECUNIA
Type: Vendor Advisory
27796

Source: SECUNIA
Type: Vendor Advisory
27797

Source: CCN
Type: SA27800
Netscape Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
27800

Source: CCN
Type: SA27816
SeaMonkey Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
27816

Source: SECUNIA
Type: Vendor Advisory
27838

Source: SECUNIA
Type: Vendor Advisory
27845

Source: SECUNIA
Type: Vendor Advisory
27855

Source: SECUNIA
Type: Vendor Advisory
27944

Source: SECUNIA
Type: Vendor Advisory
27955

Source: SECUNIA
Type: Vendor Advisory
27957

Source: SECUNIA
Type: Vendor Advisory
27979

Source: SECUNIA
Type: Vendor Advisory
28001

Source: SECUNIA
Type: Vendor Advisory
28016

Source: SECUNIA
Type: Vendor Advisory
28171

Source: SECUNIA
Type: Vendor Advisory
28277

Source: SECUNIA
Type: Vendor Advisory
28398

Source: SECUNIA
Type: UNKNOWN
29164

Source: GENTOO
Type: UNKNOWN
GLSA-200712-21

Source: CCN
Type: SECTRACK ID: 1018928
Mozilla Firefox Input Validation Hole in jar: Protocol Handler Permits Cross-Site Scripting Attacks

Source: SLACKWARE
Type: UNKNOWN
SSA:2007-333-01

Source: SLACKWARE
Type: UNKNOWN
SSA:2007-331-01

Source: SUNALERT
Type: UNKNOWN
231441

Source: CCN
Type: Sun Alert ID: 231441
Multiple Security Vulnerabilities in Solaris 10 Firefox and Thunderbird

Source: SUNALERT
Type: UNKNOWN
1018977

Source: CCN
Type: ASA-2007-492
seamonkey security update (RHSA-2007-1084)

Source: CCN
Type: ASA-2007-494
Firefox security update (RHSA-2007-1082)

Source: CCN
Type: ASA-2007-536
thunderbird security update (RHSA-2007-1083)

Source: CCN
Type: ASA-2008-085
Multiple Security Vulnerabilities in Solaris 10 Firefox and Thunderbird (Sun 231441)

Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/Advisories:rPSA-2008-0093

Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0260

Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0093

Source: DEBIAN
Type: UNKNOWN
DSA-1424

Source: DEBIAN
Type: UNKNOWN
DSA-1425

Source: DEBIAN
Type: DSA-1424
iceweasel -- several vulnerabilities

Source: DEBIAN
Type: DSA-1425
xulrunner -- several vulnerabilities

Source: CCN
Type: GLSA-200712-21
Mozilla Firefox, SeaMonkey: Multiple vulnerabilities

Source: CCN
Type: GNUCITIZEN Blog, November 7th, 2007
Web Mayhem: Firefox’s JAR: Protocol issues

Source: MISC
Type: UNKNOWN
http://www.gnucitizen.org/blog/web-mayhem-firefoxs-jar-protocol-issues

Source: CCN
Type: US-CERT VU#715737
Mozilla-based browsers jar: URI cross-site scripting vulnerability

Source: CERT-VN
Type: US Government Resource
VU#715737

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2007:246

Source: CCN
Type: MFSA 2007-37
jar: URI scheme XSS hazard

Source: CONFIRM
Type: Vendor Advisory
http://www.mozilla.org/security/announce/2007/mfsa2007-37.html

Source: CCN
Type: OSVDB ID: 43477
Mozilla Multiple Browsers jar: Protocol Handler inner URI HTTP Redirect XSS

Source: REDHAT
Type: UNKNOWN
RHSA-2007:1082

Source: REDHAT
Type: UNKNOWN
RHSA-2007:1083

Source: REDHAT
Type: UNKNOWN
RHSA-2007:1084

Source: BUGTRAQ
Type: UNKNOWN
20080212 FLEA-2008-0001-1 firefox

Source: BUGTRAQ
Type: UNKNOWN
20080229 rPSA-2008-0093-1 thunderbird

Source: BID
Type: UNKNOWN
26385

Source: CCN
Type: BID-26385
Mozilla Firefox Jar URI Cross-Site Scripting Vulnerability

Source: SECTRACK
Type: UNKNOWN
1018928

Source: CCN
Type: USN-546-1
Firefox vulnerabilities

Source: CCN
Type: USN-546-2
Firefox regression

Source: UBUNTU
Type: UNKNOWN
USN-546-2

Source: VUPEN
Type: UNKNOWN
ADV-2007-3818

Source: VUPEN
Type: UNKNOWN
ADV-2007-4002

Source: VUPEN
Type: UNKNOWN
ADV-2007-4018

Source: VUPEN
Type: UNKNOWN
ADV-2008-0083

Source: VUPEN
Type: UNKNOWN
ADV-2008-0643

Source: CCN
Type: Bugzilla@Mozilla - Bug 369814
(jarxss) - jar: protocol is an XSS hazard due to ignoring mime type and being considered same-origin with hosting site

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.mozilla.org/show_bug.cgi?id=369814

Source: XF
Type: UNKNOWN
firefox-jar-uri-xss(38356)

Source: XF
Type: UNKNOWN
firefox-jar-uri-xss(38356)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-1984

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-1995

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:9873

Source: UBUNTU
Type: UNKNOWN
USN-546-1

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-756

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-4106

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-4098

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-3952

Source: SUSE
Type: SUSE-SA:2007:066
Mozilla Firefox security update

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:*:*:*:*:*:*:*:* (Version <= 2.0.0.9)
  • OR cpe:/a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:*:*:*:*:*:*:*:* (Version <= 1.1.6)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration RedHat 9:
  • cpe:/a:redhat:rhel_productivity:5:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:mozilla:firefox:2.0:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:firefox:2.0.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:novell:linux_desktop:9:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:*
  • OR cpe:/o:novell:suse_linux_enterprise_server:10:sp2:itanium_ia64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.5.z::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.5.z::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:es:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.2:*:*:*:*:*:*:*
  • OR cpe:/o:opensuse:opensuse:10.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20075947
    V
    CVE-2007-5947
    2015-11-16
    oval:org.mitre.oval:def:17693
    P
    USN-546-1 -- firefox vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:17515
    P
    USN-546-2 -- firefox regression
    2014-06-30
    oval:org.mitre.oval:def:18486
    P
    DSA-1425-1 xulrunner - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:20371
    P
    DSA-1424-1 iceweasel - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:22680
    P
    ELSA-2007:1083: thunderbird security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:22596
    P
    ELSA-2007:1082: firefox security update (Critical)
    2014-05-26
    oval:org.mitre.oval:def:9873
    V
    The jar protocol handler in Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 retrieves the inner URL regardless of its MIME type, and considers HTML documents within a jar archive to have the same origin as the inner URL, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a jar: URI.
    2013-04-29
    oval:com.redhat.rhsa:def:20071084
    P
    RHSA-2007:1084: seamonkey security update (Critical)
    2008-01-07
    oval:com.redhat.rhsa:def:20071083
    P
    RHSA-2007:1083: thunderbird security update (Moderate)
    2007-12-19
    oval:org.debian:def:1425
    V
    several vulnerabilities
    2007-12-08
    oval:org.debian:def:1424
    V
    several vulnerabilities
    2007-12-08
    oval:com.redhat.rhsa:def:20071082
    P
    RHSA-2007:1082: firefox security update (Critical)
    2007-11-26
    BACK
    mozilla firefox 2.0.0.1
    mozilla firefox 2.0.0.2
    mozilla firefox 2.0.0.3
    mozilla firefox 2.0.0.4
    mozilla firefox 2.0.0.5
    mozilla firefox 2.0.0.6
    mozilla firefox 2.0.0.7
    mozilla firefox 2.0.0.8
    mozilla firefox *
    mozilla seamonkey 1.1.1
    mozilla seamonkey 1.1.2
    mozilla seamonkey 1.1.3
    mozilla seamonkey 1.1.4
    mozilla seamonkey 1.1.5
    mozilla seamonkey *
    mozilla firefox 2.0
    mozilla firefox 2.0.0.1
    mozilla firefox 2.0.0.2
    mozilla firefox 2.0.0.3
    mozilla firefox 2.0.0.4
    mozilla firefox 2.0.0.5
    mozilla seamonkey 1.1.3
    mozilla firefox 2.0.0.6
    mozilla firefox 2.0.0.9
    mozilla seamonkey 1.1.2
    mozilla seamonkey 1.1.1
    mozilla firefox 2.0.0.7
    mozilla seamonkey 1.1.4
    mozilla firefox 2.0.0.8
    mozilla seamonkey 1.1.5
    mozilla seamonkey 1.1.6
    gentoo linux *
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    mandrakesoft mandrake linux corporate server 3.0
    redhat enterprise linux 4
    redhat enterprise linux 4
    novell linux desktop 9
    redhat enterprise linux 4
    redhat enterprise linux 4
    suse suse linux 10.0
    redhat linux advanced workstation 2.1
    canonical ubuntu 6.06
    suse suse linux 10.1
    novell suse linux enterprise server 10 sp2
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux 2007
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 3.0
    turbolinux turbolinux fuji
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    canonical ubuntu 7.04
    redhat enterprise linux 5
    canonical ubuntu 7.10
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2007.1
    redhat enterprise linux 4.5.z
    redhat enterprise linux 4.5.z
    redhat enterprise linux 4.6.z ga
    redhat enterprise linux 4.6.z ga
    novell opensuse 10.2
    novell opensuse 10.3