Lucene search

K
cve[email protected]CVE-2012-4205
HistoryNov 21, 2012 - 12:55 p.m.

CVE-2012-4205

2012-11-2112:55:01
CWE-352
web.nvd.nist.gov
33
cve-2012-4205
mozilla firefox
thunderbird
seamonkey
security bypass
cross-site request forgery
csrf
sandbox
add-on

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.5 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.0%

Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.

Affected configurations

NVD
Node
mozillafirefoxRange<17.0
OR
mozillaseamonkeyRange<2.14
OR
mozillathunderbirdRange<17.0
Node
canonicalubuntu_linuxMatch10.04
OR
canonicalubuntu_linuxMatch11.10
OR
canonicalubuntu_linuxMatch12.04esm
OR
canonicalubuntu_linuxMatch12.10
Node
opensuseopensuseMatch11.4
OR
opensuseopensuseMatch12.1
OR
opensuseopensuseMatch12.2
OR
suselinux_enterprise_desktopMatch10sp4-
OR
suselinux_enterprise_desktopMatch11sp2
OR
suselinux_enterprise_serverMatch10sp4-
OR
suselinux_enterprise_serverMatch11sp2-
OR
suselinux_enterprise_serverMatch11sp2vmware
OR
suselinux_enterprise_software_development_kitMatch11sp2
OR
suselinux_enterprise_software_development_kitMatch11sp3

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

8.5 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.0%