Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2009-1312Cross-site Scripting in Mozilla Firefox

Severity
4.3MEDIUMNVD
EPSS
5.7%
top 9.61%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 22
Latest updateMay 2

Description

Mozilla Firefox before 3.0.9 and SeaMonkey 1.1.17 do not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header. NOTE: it was later reported that Firefox 3.6 a1 pre and Mozilla 1.7.x and earlier are also affected.

CVSS vector

AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9

Affected Packages4 packages

NVDmozilla/firefox3.0.8+80
NVDgoogle/chrome1.0.154.48+15
NVDopera/opera_browser9.52+23

Patches

🔴Vulnerability Details

4
GHSA
GHSA-8jfm-rmxf-hfp3: Google Chrome 12022-05-02
GHSA
GHSA-599h-6j66-vpc4: Opera 92022-05-02
GHSA
GHSA-qvrc-hgq4-x7gw: Microsoft Internet Explorer 62022-05-02
GHSA
GHSA-3mmx-h8fr-v7j4: Mozilla Firefox before 32022-05-02

💥Exploits & PoCs

1
Exploit-DB
Mozilla (Multiple Products) - Server Refresh Header Cross-Site Scripting2009-04-22

📋Vendor Advisories

2
Ubuntu
Firefox and Xulrunner vulnerabilities2009-04-23
Red Hat
javascript: URIs2009-04-21

💬Community

1
Bugzilla
CVE-2009-1312 Firefox allows Refresh header to redirect to javascript: URIs2009-04-17