js/xpconnect/crashtests/509075-1.html

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd">
     2 <html>
     3   <script>
     5     var txt = document.createTextNode("");
     6     var b = document.createElement("b");
     7     var w = b["watch"];
     8     var txtdg = txt["__lookupGetter__"];
     9     w["__defineGetter__"]("toString",txtdg);
    10     var obj = {
    11       variable: 910,
    12       fun: function() {
    13         w["toString"]();
    14       }
    15     };
    17     function vuln()
    18     {
    19       window.status = "" + obj.variable;
    20       try{
    21         obj.fun();
    22       }catch(er){}
    23       return obj;
    24     }
    26     var ret = vuln();
    27   </script>
    28 </html>

mercurial