Lucene search

K
mozillaMozilla FoundationMFSA2014-14
HistoryFeb 06, 2014 - 12:00 a.m.

Script execution in HTML mail replies — Mozilla

2014-02-0600:00:00
Mozilla Foundation
www.mozilla.org
28

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.942 High

EPSS

Percentile

99.2%

Security researcher Fabián Cuchietti discovered that it was possible to bypass the restriction on JavaScript execution in mail by embedding an with a data: URL within a message. If the victim replied or forwarded the mail after receiving it, quoting it “in-line” using Thunderbird’s HTML mail editor, it would run the attached script. The running script would be restricted to the mail composition window where it could observe and potentially modify the content of the mail before it was sent. Scripts were not executed if the recipient merely viewed the mail, only if it was edited as HTML. Turning off HTML composition prevented the vulnerability and forwarding the mail “as attachment” prevented the forwarding variant.

Affected configurations

Vulners
Node
mozillaseamonkeyRange<2.20
OR
mozillathunderbirdRange<23
CPENameOperatorVersion
seamonkeylt2.20
thunderbirdlt23

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.942 High

EPSS

Percentile

99.2%