{"vuid":"VU#651928","idnumber":"651928","name":"Mozilla may allow violation of cross-domain scripting policies via dragging","keywords":["Mozilla","arbitrary code execution","link dragging","information disclosure"],"overview":"A vulnerability affecting Mozilla web browsers may allow violation of cross-domain scripting policies and possibly execute code originating from a remote source.","clean_desc":"Mozilla web browsers allow the dragging of links and objects from one window to another. Should the object copied be javascript, then it may execute in the context of a script originating from a local source rather than a remote location. According to Mozilla's bug report: \"The user could be convinced to drag obscurred links in the context of a game or even a fake scrollbar. If the user could be convinced to drag two links in sequence into a separate window (not frame) the attacker would be able to run arbitrary programs.\"","impact":"This vulnerability could be used to exploit cross-domain scripting policies and possibly execute code originating from a remote source.","resolution":"This vulnerability is resolved in Firefox Preview Release, Mozilla 1.7.3, and Thunderbird 0.8.","workarounds":"","sysaffected":"","thanks":"Thanks to Jesse Ruderman for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["http://secunia.com/advisories/12526/","http://bugzilla.mozilla.org/show_bug.cgi?id=250862","http://www.mozilla.org/projects/security/known-vulnerabilities.html","http://www.securitytracker.com/alerts/2004/Sep/1011317.html","http://www.securitytracker.com/alerts/2004/Sep/1011318.html"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-09-16T15:07:43Z","publicdate":"2004-09-14T00:00:00Z","datefirstpublished":"2004-09-17T18:02:41Z","dateupdated":"2004-09-17T18:10:50Z","revision":10,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"15","cam_easeofexploitation":"12","cam_attackeraccessrequired":"20","cam_scorecurrent":"25.3125","cam_scorecurrentwidelyknown":"30.375","cam_scorecurrentwidelyknownexploited":"50.625","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":25.3125,"vulnote":null}