Revision: 3623
Author: metaweta
Date: Fri Jul 31 16:22:33 2009
Log: Edited wiki page through web user interface.
http://code.google.com/p/google-caja/source/detail?r=3623

Modified:
 /wiki/SecurityAdvisory20090707.wiki

=======================================
--- /wiki/SecurityAdvisory20090707.wiki Fri Jul 31 05:00:31 2009
+++ /wiki/SecurityAdvisory20090707.wiki Fri Jul 31 16:22:33 2009
@@ -8,7 +8,7 @@

was not successfully closed. The underlying problem is that Domita contains constructors whose purpose is to be used *internally* to construct tamed wrappers around DOM nodes, and to be available to cajoled code for use in type-testing those wrappers. However, by having access to these constructors themselves, cajoled code could call these constructors in ways that violate their assumptions.

-http://code.google.com/p/google-caja/issues/detail?id=1065 explains how some constructors were still accessible. In that issue thread, Ihab demonstrates that Felix's arbitrary code execution exploit is still feasible. +http://code.google.com/p/google-caja/issues/detail?id=1065 explains how some constructors were still accessible. In that issue thread, Ihab demonstrates that Felix's arbitrary code execution exploit was still feasible.

This remaining vulnerability affects Caja version r3545 (submitted 23 Jun 2009) or later. They are both fixed in version r3557 and thereafter.

Reply via email to