You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Feb 2, 2021. It is now read-only.
Kevin Reid edited this page Apr 16, 2015
·
1 revision
(legacy summary: Security Advisory 2012/01/16)
Caja Security Advisory 2012/01/16
Revision 4374 of Caja inadvertently introduced a change to the CSS properties of the container DIVs created by Caja, making it possible to craft guest code creating visible content outside the boundary of the double-DIV sandbox enforced by Caja. For example:
This vulnerability allows guest content authors to overlay and mimic the user interface of surrounding container content, and thus attempt to phish the end-user into entering into the guest content information that would normally only be revealed to the container.