cve/2005/CVE-2005-1477.md

21 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2005-1477](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1477)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The install function in Firefox 1.0.3 allows remote web sites on the browser's whitelist, such as update.mozilla.org or addon.mozilla.org, to execute arbitrary Javascript with chrome privileges, leading to arbitrary code execution on the system when combined with vulnerabilities such as CVE-2005-1476, as demonstrated using a javascript: URL as the package icon and a cross-site scripting (XSS) attack on a vulnerable whitelist site.
### POC
#### Reference
- http://marc.info/?l=full-disclosure&m=111553138007647&w=2
- http://marc.info/?l=full-disclosure&m=111556301530553&w=2
- https://bugzilla.mozilla.org/show_bug.cgi?id=293302
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9231
#### Github
No PoCs found on GitHub currently.