Lucene search

K
mozillaMozilla FoundationMFSA2011-38
HistorySep 27, 2011 - 12:00 a.m.

XSS via plugins and shadowed window.location object — Mozilla

2011-09-2700:00:00
Mozilla Foundation
www.mozilla.org
28

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.011

Percentile

84.3%

Mozilla developer Boris Zbarsky reported that a frame named “location” could shadow the window.location object unless a script in a page grabbed a reference to the true object before the frame was created. Because some plugins use the value of window.location to determine the page origin this could fool the plugin into granting the plugin content access to another site or the local file system in violation of the Same Origin Policy. This flaw allows circumvention of the fix added for MFSA 2010-10.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.6.23
OR
mozillafirefoxRange<6
OR
mozillaseamonkeyRange<2.3
OR
mozillathunderbirdRange<3.1.15
OR
mozillathunderbirdRange<6
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.011

Percentile

84.3%