Saturday, September 18, 2010

Flock Browser: Javascript Same-Origin Policy Violation (XSS)

Users of Flock Browser please be advised of a Javascript Same-Origin Policy Violation (XSS) vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com

FLOCK-SA-2010-04: [FLOCK-SA-2010-04] Flock Browser: Javascript Same-Origin Policy Violation (XSS)

Affected Products: Flock 3 versions prior to 3.0.0.4094
Details:



WebCore/bindings/v8/custom/V8DOMWindowCustom.cpp in WebKit before

r52401, as used in Google Chrome before 4.0.249.78, allows remote

attackers to bypass the Same Origin Policy via vectors involving

the window.open method.
Read more at www.criticalwatch.com
 

No comments:

Post a Comment