Lucene search

K
mozillaMozilla FoundationMFSA2013-72
HistoryAug 06, 2013 - 12:00 a.m.

Wrong principal used for validating URI for some Javascript components — Mozilla

2013-08-0600:00:00
Mozilla Foundation
www.mozilla.org
18

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

75.2%

Security researcher Cody Crews reported that some Javascript components will perform checks against the wrong uniform resource identifier (URI) before performing security sensitive actions. This will return an incorrect location for the originator of the call. This could be used to bypass same-origin policy, allowing for cross-site scripting (XSS) or the installation of malicious add-ons from third-party pages.

Affected configurations

Vulners
Node
mozillafirefoxRange<23
OR
mozillafirefox_esrRange<17.0.8
OR
mozillaseamonkeyRange<2.20
OR
mozillathunderbirdRange<17.0.8
OR
mozillathunderbird_esrRange<17.0.8

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

75.2%