Lucene search

K
mozillaMozilla FoundationMFSA2006-19
HistoryApr 13, 2006 - 12:00 a.m.

Cross-site scripting using .valueOf.call() — Mozilla

2006-04-1300:00:00
Mozilla Foundation
www.mozilla.org
13

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.205 Low

EPSS

Percentile

96.3%

moz_bug_r_a4 discovered that .valueOf.call() and .valueOf.apply() when called with no arguments were returning the Object class prototype rather than the caller’s global window object. When called on a reachable property of another window this provides a hook to get around the same-origin protection, allowing an attacker to inject script into another window.

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.205 Low

EPSS

Percentile

96.3%