COMMAND

    javascript

SYSTEMS AFFECTED

    HotJava 3.0

PROBLEM

    Following is  based on  a Georgi  Guninski security  advisory #25.
    There is  a security  vulnerability in  HotJava Browser  3.0 which
    allows accessing  the DOM  of arbitrary  URLs after  viewing a web
    page.  This allows stealing of cookies.

    The problem is opening an javascript: URL in a named window, which
    allows accessing the DOM of the document in the named window.

    The code is:

        <SCRIPT>
        window.open("http://www.sun.com","g");
        setTimeout("window.open('javascript:alert(\"The first link is:
        \"+document.links[0].href);alert(\"The cookie is:
        \"+document.cookie)','g')",10000);
        </SCRIPT>

    Demonstration is available at:

        http://www.guninski.com/hotjava-1.html

SOLUTION

    Disable  JavaScript.   Sun's  current  plan  is  that  the HotJava
    Browser may not be included in a future Solaris release.  However,
    this plan is subject to change at Sun's sole discretion.

    According to Sun's documents on Solaris8 subject,  The HotJava(TM)
    browser is no longer supported.