CVE-2009-1312 (retired)

Priority
Description
Mozilla Firefox before 3.0.9 and SeaMonkey 1.1.17 do not block javascript:
URIs in Refresh headers in HTTP responses, which allows remote attackers to
conduct cross-site scripting (XSS) attacks via vectors related to (1)
injecting a Refresh header or (2) specifying the content of a Refresh
header. NOTE: it was later reported that Firefox 3.6 a1 pre and Mozilla
1.7.x and earlier are also affected.
Notes
jdstrandCVEs in Firefox are tracked in the xulrunner source packages. The
mapping of xulrunner sources to firefox is:
xulrunner (1.8.0): firefox (1.5) - Ubuntu 6.06 LTS
xulrunner (1.8.1): firefox (2.0) - Ubuntu 6.10 - 8.04 LTS
xulrunner-1.9: firefox-3.0
xulrunner-1.9.1: firefox-3.5
Ubuntu 6.06 LTS and 10.04 LTS uses the embedded xulrunner and not
the system xulrunner-1.9.2, so it is tracked in the firefox source package.
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
Package
Upstream:needs-triage
More Information

Updated: 2019-10-09 07:16:17 UTC (commit 33aea848a182c0afcd0a3f927a01a7ecd9a061ee)