Mozilla Foundation Security Advisory 2008-57
-moz-binding property bypasses security checks on codebase principals
- Announced
- November 12, 2008
- Reporter
- Collin Jackson
- Impact
- High
- Products
- Firefox, SeaMonkey
- Fixed in
-
- Firefox 2.0.0.18
- Firefox 3.0.4
- SeaMonkey 1.1.13
Description
Security researcher Collin Jackson reported that the -moz-binding CSS property can be used to bypass security checks which validate codebase principals. Similar to the issue reported in MFSA 2008-23, Jackson demonstrated that an attacker can replace a stylesheet in a signed JAR which uses relative paths, and can then use the -moz-binding property to inject malicious script into the JAR. The injected script will be executed with the privileges of the signed JAR. This vulnerability can thus allow an attacker to run arbitrary JavaScript within the context of another site.
Workaround
Disable JavaScript until a version containing these fixes can be installed.