CVE-2007-3089

N/A Unknown
Published: June 06, 2007 Modified: April 23, 2026
View on NVD

Description

Mozilla Firefox before 2.0.0.5 does not prevent use of document.write to replace an IFRAME (1) during the load stage or (2) in the case of an about:blank frame, which allows remote attackers to display arbitrary HTML or execute certain JavaScript code, as demonstrated by code that intercepts keystroke values from window.event, aka the "promiscuous IFRAME access bug," a related issue to CVE-2006-4568.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/38024
Source: cve@mitre.org
http://secunia.com/advisories/25589
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26072
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26095
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26103
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26106
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26107
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26149
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26151
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26159
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26179
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26204
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26205
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26211
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26216
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26258
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26271
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26460
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/28135
Source: cve@mitre.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/143297
Source: cve@mitre.org
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA07-199A.html
Source: cve@mitre.org
US Government Resource
http://lcamtuf.coredump.cx/ifsnatch/
Source: af854a3a-2127-422b-91ae-364da2661108
http://osvdb.org/38024
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25589
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26072
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26095
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26103
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26106
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26107
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26149
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26151
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26159
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26179
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26204
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26205
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26211
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26216
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26258
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26271
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26460
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/28135
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securityreason.com/securityalert/2781
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103177-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201516-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2007/dsa-1337
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2007/dsa-1338
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2007/dsa-1339
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200708-09.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/143297
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2007:152
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2007/mfsa2007-20.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0722.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0723.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2007-0724.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/470446/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/474226/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/474542/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/24286
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1018412
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-490-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA07-199A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2007/2564
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/4256
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.mozilla.org/show_bug.cgi?id=381300
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.mozilla.org/show_bug.cgi?id=381300
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.mozilla.org/show_bug.cgi?id=382686
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.mozilla.org/show_bug.cgi?id=382686
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/34701
Source: af854a3a-2127-422b-91ae-364da2661108

108 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
25.3%
96th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

mozilla