Secunia Research: Netscape Property Manipulation Cross-Site Scripting

======================================================================

                     Secunia Research 13/07/2005

       - Netscape Property Manipulation Cross-Site Scripting -

======================================================================
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Description of Vulnerability.........................................3
Solution.............................................................4
Time Table...........................................................5
Credits..............................................................6
References...........................................................7
About Secunia........................................................8
Verification.........................................................9

======================================================================
1) Affected Software

Netscape 8.0.1, 8.0.2

Other versions may also be affected.

======================================================================
2) Severity

Rating: Moderately critical
Impact: Cross-site scripting
Where:  From remote

======================================================================
3) Description of Vulnerability

Secunia Research has discovered a vulnerability in Netscape, which 
can be exploited by malicious people to conduct cross-site scripting 
attacks.

The problem is that the "frames", "parent", "self" and "top" DHTML
properties are not properly protected from being modified by another 
site via JavaScript. This can be exploited to execute arbitrary HTML 
and script code in a user's browser session in context of an arbitrary 
site, which calls a method in one of the modified properties.

The vulnerability has been confirmed in version 8.0.1 and 8.0.2. 
Other versions may also be affected.

======================================================================
4) Solution

Disable JavaScript support.

======================================================================
5) Time Table

31/05/2005 - Vendor notified.
13/07/2005 - Public disclosure.

======================================================================
6) Credits

Discovered by Andreas Sandblad, Secunia Research.

======================================================================
7) References

Mozilla:
http://www.mozilla.org/security/announce/mfsa2005-52.html

======================================================================
8) About Secunia

Secunia collects, validates, assesses, and writes advisories regarding
all the latest software vulnerabilities disclosed to the public. These
advisories are gathered in a publicly available database at the
Secunia web site:

http://secunia.com/

Secunia offers services to our customers enabling them to receive all
relevant vulnerability information to their specific system
configuration.

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/

======================================================================
9) Verification

Please verify this advisory by visiting the Secunia web site:
http://secunia.com/secunia_research/2005-16/advisory/

Complete list of vulnerability reports released by Secunia Research:
http://secunia.com/secunia_research/

=====================================================================