Lucene search

K
mozillaMozilla FoundationMFSA2014-82
HistoryOct 14, 2014 - 12:00 a.m.

Accessing cross-origin objects via the Alarms API — Mozilla

2014-10-1400:00:00
Mozilla Foundation
www.mozilla.org
28

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.007

Percentile

80.5%

Mozilla developer Boris Zbarsky reported that a malicious app could use the AlarmAPI to read the values of cross-origin references, such as an iframe’s location object, as part of an alarm’s JSON data. This allows a malicious app to bypass same-origin policy.

Affected configurations

Vulners
Node
mozillafirefoxRange<33
OR
mozillafirefox_esrRange<31.2
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillafirefox_esr*cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.007

Percentile

80.5%