Lucene search

K
cve[email protected]CVE-2013-1711
HistoryAug 07, 2013 - 1:55 a.m.

CVE-2013-1711

2013-08-0701:55:04
CWE-79
web.nvd.nist.gov
41
cve-2013-1711
xraywrapper
mozilla firefox
seamonkey
xss
cross-site scripting
security vulnerability
nvd

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.2%

The XrayWrapper implementation in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 does not properly address the possibility of an XBL scope bypass resulting from non-native arguments in XBL function calls, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging access to an unprivileged object.

Affected configurations

NVD
Node
mozillaseamonkeyRange2.20beta3
OR
mozillaseamonkeyMatch2.0
OR
mozillaseamonkeyMatch2.0alpha_1
OR
mozillaseamonkeyMatch2.0alpha_2
OR
mozillaseamonkeyMatch2.0alpha_3
OR
mozillaseamonkeyMatch2.0beta_1
OR
mozillaseamonkeyMatch2.0beta_2
OR
mozillaseamonkeyMatch2.0rc1
OR
mozillaseamonkeyMatch2.0rc2
OR
mozillaseamonkeyMatch2.0.1
OR
mozillaseamonkeyMatch2.0.2
OR
mozillaseamonkeyMatch2.0.3
OR
mozillaseamonkeyMatch2.0.4
OR
mozillaseamonkeyMatch2.0.5
OR
mozillaseamonkeyMatch2.0.6
OR
mozillaseamonkeyMatch2.0.7
OR
mozillaseamonkeyMatch2.0.8
OR
mozillaseamonkeyMatch2.0.9
OR
mozillaseamonkeyMatch2.0.10
OR
mozillaseamonkeyMatch2.0.11
OR
mozillaseamonkeyMatch2.0.12
OR
mozillaseamonkeyMatch2.0.13
OR
mozillaseamonkeyMatch2.0.14
OR
mozillaseamonkeyMatch2.1
OR
mozillaseamonkeyMatch2.1alpha1
OR
mozillaseamonkeyMatch2.1alpha2
OR
mozillaseamonkeyMatch2.1alpha3
OR
mozillaseamonkeyMatch2.1beta1
OR
mozillaseamonkeyMatch2.1beta2
OR
mozillaseamonkeyMatch2.1beta3
OR
mozillaseamonkeyMatch2.1rc1
OR
mozillaseamonkeyMatch2.1rc2
OR
mozillaseamonkeyMatch2.2
OR
mozillaseamonkeyMatch2.2beta1
OR
mozillaseamonkeyMatch2.2beta2
OR
mozillaseamonkeyMatch2.2beta3
OR
mozillaseamonkeyMatch2.3
OR
mozillaseamonkeyMatch2.3beta1
OR
mozillaseamonkeyMatch2.3beta2
OR
mozillaseamonkeyMatch2.3beta3
OR
mozillaseamonkeyMatch2.3.1
OR
mozillaseamonkeyMatch2.3.2
OR
mozillaseamonkeyMatch2.3.3
OR
mozillaseamonkeyMatch2.4
OR
mozillaseamonkeyMatch2.4beta1
OR
mozillaseamonkeyMatch2.4beta2
OR
mozillaseamonkeyMatch2.4beta3
OR
mozillaseamonkeyMatch2.4.1
OR
mozillaseamonkeyMatch2.5
OR
mozillaseamonkeyMatch2.5beta1
OR
mozillaseamonkeyMatch2.5beta2
OR
mozillaseamonkeyMatch2.5beta3
OR
mozillaseamonkeyMatch2.5beta4
OR
mozillaseamonkeyMatch2.6
OR
mozillaseamonkeyMatch2.6beta1
OR
mozillaseamonkeyMatch2.6beta2
OR
mozillaseamonkeyMatch2.6beta3
OR
mozillaseamonkeyMatch2.6beta4
OR
mozillaseamonkeyMatch2.6.1
OR
mozillaseamonkeyMatch2.7
OR
mozillaseamonkeyMatch2.7beta1
OR
mozillaseamonkeyMatch2.7beta2
OR
mozillaseamonkeyMatch2.7beta3
OR
mozillaseamonkeyMatch2.7beta4
OR
mozillaseamonkeyMatch2.7beta5
OR
mozillaseamonkeyMatch2.7.1
OR
mozillaseamonkeyMatch2.7.2
OR
mozillaseamonkeyMatch2.8
OR
mozillaseamonkeyMatch2.8beta1
OR
mozillaseamonkeyMatch2.8beta2
OR
mozillaseamonkeyMatch2.8beta3
OR
mozillaseamonkeyMatch2.8beta4
OR
mozillaseamonkeyMatch2.8beta5
OR
mozillaseamonkeyMatch2.8beta6
OR
mozillaseamonkeyMatch2.9
OR
mozillaseamonkeyMatch2.9beta1
OR
mozillaseamonkeyMatch2.9beta2
OR
mozillaseamonkeyMatch2.9beta3
OR
mozillaseamonkeyMatch2.9beta4
OR
mozillaseamonkeyMatch2.9.1
OR
mozillaseamonkeyMatch2.10
OR
mozillaseamonkeyMatch2.10beta1
OR
mozillaseamonkeyMatch2.10beta2
OR
mozillaseamonkeyMatch2.10beta3
OR
mozillaseamonkeyMatch2.10.1
OR
mozillaseamonkeyMatch2.11
OR
mozillaseamonkeyMatch2.11beta1
OR
mozillaseamonkeyMatch2.11beta2
OR
mozillaseamonkeyMatch2.11beta3
OR
mozillaseamonkeyMatch2.11beta4
OR
mozillaseamonkeyMatch2.11beta5
OR
mozillaseamonkeyMatch2.11beta6
OR
mozillaseamonkeyMatch2.12
OR
mozillaseamonkeyMatch2.12beta1
OR
mozillaseamonkeyMatch2.12beta2
OR
mozillaseamonkeyMatch2.12beta3
OR
mozillaseamonkeyMatch2.12beta4
OR
mozillaseamonkeyMatch2.12beta5
OR
mozillaseamonkeyMatch2.12beta6
OR
mozillaseamonkeyMatch2.12.1
OR
mozillaseamonkeyMatch2.13
OR
mozillaseamonkeyMatch2.13beta1
OR
mozillaseamonkeyMatch2.13beta2
OR
mozillaseamonkeyMatch2.13beta3
OR
mozillaseamonkeyMatch2.13beta4
OR
mozillaseamonkeyMatch2.13beta5
OR
mozillaseamonkeyMatch2.13beta6
OR
mozillaseamonkeyMatch2.13.1
OR
mozillaseamonkeyMatch2.13.2
OR
mozillaseamonkeyMatch2.14
OR
mozillaseamonkeyMatch2.14beta1
OR
mozillaseamonkeyMatch2.14beta2
OR
mozillaseamonkeyMatch2.14beta3
OR
mozillaseamonkeyMatch2.14beta4
OR
mozillaseamonkeyMatch2.14beta5
OR
mozillaseamonkeyMatch2.15
OR
mozillaseamonkeyMatch2.15beta1
OR
mozillaseamonkeyMatch2.15beta2
OR
mozillaseamonkeyMatch2.15beta3
OR
mozillaseamonkeyMatch2.15beta4
OR
mozillaseamonkeyMatch2.15beta5
OR
mozillaseamonkeyMatch2.15beta6
OR
mozillaseamonkeyMatch2.15.1
OR
mozillaseamonkeyMatch2.15.2
OR
mozillaseamonkeyMatch2.16
OR
mozillaseamonkeyMatch2.16beta1
OR
mozillaseamonkeyMatch2.16beta2
OR
mozillaseamonkeyMatch2.16beta3
OR
mozillaseamonkeyMatch2.16beta4
OR
mozillaseamonkeyMatch2.16beta5
OR
mozillaseamonkeyMatch2.16.1
OR
mozillaseamonkeyMatch2.16.2
OR
mozillaseamonkeyMatch2.17
OR
mozillaseamonkeyMatch2.17beta1
OR
mozillaseamonkeyMatch2.17beta2
OR
mozillaseamonkeyMatch2.17beta3
OR
mozillaseamonkeyMatch2.17beta4
OR
mozillaseamonkeyMatch2.17.1
OR
mozillaseamonkeyMatch2.18beta1
OR
mozillaseamonkeyMatch2.18beta2
OR
mozillaseamonkeyMatch2.18beta3
OR
mozillaseamonkeyMatch2.18beta4
OR
mozillaseamonkeyMatch2.19
OR
mozillaseamonkeyMatch2.19beta1
OR
mozillaseamonkeyMatch2.19beta2
OR
mozillaseamonkeyMatch2.20beta1
OR
mozillaseamonkeyMatch2.20beta2
Node
mozillafirefoxRange22.0
OR
mozillafirefoxMatch19.0
OR
mozillafirefoxMatch19.0.1
OR
mozillafirefoxMatch19.0.2
OR
mozillafirefoxMatch20.0
OR
mozillafirefoxMatch20.0.1
OR
mozillafirefoxMatch21.0

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

5.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

50.2%