Lucene search

K
mozillaMozilla FoundationMFSA2006-63
HistorySep 14, 2006 - 12:00 a.m.

JavaScript execution in mail via XBL — Mozilla

2006-09-1400:00:00
Mozilla Foundation
www.mozilla.org
13

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

0.062 Low

EPSS

Percentile

93.5%

Georgi Guninski demonstrated that even with JavaScript disabled in mail (the default) an attacker can still execute JavaScript when a mail message is viewed, replied to, or forwarded by putting the script in a remote XBL file loaded by the message. The executed script could be used to alter or change the appearance of the message, and can act as a “mail-tap” to spy on the contents added to a reply or forward. For example, the attacker could make a provocative offer to a rival business and then watch the internal debate as it was forwarded and replied to.

CPENameOperatorVersion
seamonkeylt1.0.5
thunderbirdlt1.5.0.7

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

0.062 Low

EPSS

Percentile

93.5%