Lucene search

K
mozillaMozilla FoundationMFSA2009-70
HistoryDec 15, 2009 - 12:00 a.m.

Privilege escalation via chrome window.opener — Mozilla

2009-12-1500:00:00
Mozilla Foundation
www.mozilla.org
12

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.017 Low

EPSS

Percentile

87.5%

Security researcher David James reported that a content window which is opened by a chrome window retains a reference to the chrome window via the window.opener property. Using this reference, content in the new window can access functions inside the chrome window, such as eval, and use these functions to run arbitrary JavaScript code with chrome privileges. In a stock Mozilla browser a remote attacker can not cause these application dialogs to appear nor to automatically load the attack code that takes advantage of this flaw in window.opener. There may be add-ons which open potentially hostile web-content in this way, and combined with such an add-on the severity of this flaw could be upgraded to Critical.

CPENameOperatorVersion
firefoxlt3.0.16
firefoxlt3.5.6
seamonkeylt2.0.1

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.017 Low

EPSS

Percentile

87.5%