Lucene search

K
mozillaMozilla FoundationMFSA2009-61
HistoryOct 27, 2009 - 12:00 a.m.

Cross-origin data theft through document.getSelection() β€” Mozilla

2009-10-2700:00:00
Mozilla Foundation
www.mozilla.org
10

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.006 Low

EPSS

Percentile

78.0%

Security researcher Gregory Fleischer reported that text within a selection on a web page can be read by JavaScript in a different domain using the document.getSelection function, violating the same-origin policy. Since this vulnerability requires user interaction to exploit, its severity was determined to be moderate.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.0.15
OR
mozillafirefoxRange<3.5.4
CPENameOperatorVersion
firefoxlt3.0.15
firefoxlt3.5.4

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.006 Low

EPSS

Percentile

78.0%