Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-controlled resource that uses a 302 redirect to a resource in a different domain, then reading content from the response, aka "response disclosure."
Metrics
Affected Vendors & Products
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published: 2008-12-17T23:00:00.000Z
Updated: 2024-08-07T10:56:46.884Z
Reserved: 2008-12-12T00:00:00.000Z
Link: CVE-2008-5506
No data.
Status : Deferred
Published: 2008-12-17T23:30:00.563
Modified: 2025-04-09T00:30:58.490
Link: CVE-2008-5506