Lucene search

K
mozillaMozilla FoundationMFSA2010-21
HistoryMar 30, 2010 - 12:00 a.m.

Arbitrary code execution with Firebug XMLHttpRequestSpy β€” Mozilla

2010-03-3000:00:00
Mozilla Foundation
www.mozilla.org
20

0.013 Low

EPSS

Percentile

85.7%

Mozilla security researcher moz_bug_r_a4 reported that the XMLHttpRequestSpy module in the Firebug add-on was exposing an underlying chrome privilege escalation vulnerability. When the XMLHttpRequestSpy object was created, it would attach various properties of itself to objects defined in web content, which were not being properly wrapped to prevent their exposure to chrome privileged objects. This could result in an attacker running arbitrary JavaScript on a victim’s machine, though it required the victim to have Firebug installed, so the overall severity of the issue was determined to be High.

CPENameOperatorVersion
firefoxlt3.0.19
firefoxlt3.5.8
seamonkeylt2.0.3