Revision: 3621
Author: [email protected]
Date: Fri Jul 31 05:00:31 2009
Log: Created wiki page through web user interface.
http://code.google.com/p/google-caja/source/detail?r=3621

Added:
 /wiki/SecurityAdvisory20090707.wiki

=======================================
--- /dev/null
+++ /wiki/SecurityAdvisory20090707.wiki Fri Jul 31 05:00:31 2009
@@ -0,0 +1,27 @@
+#summary Security Advisory 7 July 2009
+
+=Caja Security Advisory 7-July-2009=
+
+The second hole documented in our [SecurityAdvisory20090623 previous security advisory]:
+
+ noted the risk of a known issue whereby an attacker may be able to construct a fake DOM wrapper object and possibly trick Caja into providing them with powerful objects not otherwise provided to sandboxed code. Subsequently, Felix Lee of Yahoo! discovered a method to escalate this into a full breach on Microsoft Internet Explorer versions 6 and 7.
+
+was not successfully closed. The underlying problem is that Domita contains constructors whose purpose is to be used *internally* to construct tamed wrappers around DOM nodes, and to be available to cajoled code for use in type-testing those wrappers. However, by having access to these constructors themselves, cajoled code could call these constructors in ways that violate their assumptions.
+
+http://code.google.com/p/google-caja/issues/detail?id=1065 explains how some constructors were still accessible. In that issue thread, Ihab demonstrates that Felix's arbitrary code execution exploit is still feasible.
+
+This remaining vulnerability affects Caja version r3545 (submitted 23 Jun 2009) or later. They are both fixed in version r3557 and thereafter.
+
+==Impact==
+
+These vulnerabilities allow attacking sandboxed code to completely bypass all Caja's protections.
+
+==Advice==
+
+Upgrade to a version of Caja at or after r3557.
+
+==More Information==
+
+See the following issue:
+
+http://code.google.com/p/google-caja/issues/detail?id=1065

Reply via email to