Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.
lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.html
lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.html
lists.opensuse.org/opensuse-updates/2012-11/msg00090.html
lists.opensuse.org/opensuse-updates/2012-11/msg00092.html
lists.opensuse.org/opensuse-updates/2012-11/msg00093.html
secunia.com/advisories/51369
secunia.com/advisories/51370
secunia.com/advisories/51381
secunia.com/advisories/51434
secunia.com/advisories/51439
secunia.com/advisories/51440
www.mozilla.org/security/announce/2012/mfsa2012-97.html
www.securityfocus.com/bid/56621
www.ubuntu.com/usn/USN-1636-1
www.ubuntu.com/usn/USN-1638-1
www.ubuntu.com/usn/USN-1638-2
www.ubuntu.com/usn/USN-1638-3
bugzilla.mozilla.org/show_bug.cgi?id=779821
exchange.xforce.ibmcloud.com/vulnerabilities/80175
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16965