Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-controlled resource that uses a 302 redirect to a resource in a different domain, then reading content from the response, aka "response disclosure."
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T10:56:46.884Z
Reserved: 2008-12-12T00:00:00
Link: CVE-2008-5506

No data.

Status : Modified
Published: 2008-12-17T23:30:00.563
Modified: 2024-11-21T00:54:12.817
Link: CVE-2008-5506
