CVE-2009-1307

N/A Unknown
Published: April 22, 2009 Modified: April 23, 2026
View on NVD

Description

The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/34758
Source: secalert@redhat.com
http://secunia.com/advisories/34780
Source: secalert@redhat.com
http://secunia.com/advisories/34843
Source: secalert@redhat.com
http://secunia.com/advisories/34844
Source: secalert@redhat.com
http://secunia.com/advisories/34894
Source: secalert@redhat.com
http://secunia.com/advisories/35042
Source: secalert@redhat.com
http://secunia.com/advisories/35065
Source: secalert@redhat.com
http://secunia.com/advisories/35536
Source: secalert@redhat.com
http://secunia.com/advisories/35561
Source: secalert@redhat.com
http://secunia.com/advisories/35602
Source: secalert@redhat.com
http://secunia.com/advisories/35882
Source: secalert@redhat.com
http://www.mozilla.org/security/announce/2009/mfsa2009-17.html
Source: secalert@redhat.com
Vendor Advisory
http://www.securityfocus.com/bid/34656
Source: secalert@redhat.com
http://www.ubuntu.com/usn/usn-782-1
Source: secalert@redhat.com
https://usn.ubuntu.com/764-1/
Source: secalert@redhat.com
http://rhn.redhat.com/errata/RHSA-2009-0437.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34758
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34780
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34843
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34844
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/34894
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35042
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35065
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35536
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35561
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35602
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35882
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1797
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2009/dsa-1830
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:111
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:141
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mozilla.org/security/announce/2009/mfsa2009-17.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2009-0436.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-1125.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2009-1126.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/34656
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1022093
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/usn-782-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/1125
Source: af854a3a-2127-422b-91ae-364da2661108
https://bugzilla.mozilla.org/show_bug.cgi?id=481342
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
https://usn.ubuntu.com/764-1/
Source: af854a3a-2127-422b-91ae-364da2661108

76 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.4%
80th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mozilla