Lucene search

K
mozillaMozilla FoundationMFSA2014-84
HistoryDec 02, 2014 - 12:00 a.m.

XBL bindings accessible via improper CSS declarations — Mozilla

2014-12-0200:00:00
Mozilla Foundation
www.mozilla.org
25

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

79.3%

Security researcher Cody Crews reported a method to trigger chrome level XML Binding Language (XBL) bindings through web content. This was possible because some chrome accessible CSS stylesheets had their primary namespace improperly declared. When this occurred, it was possible to use these stylesheets to manipulate XBL bindings, allowing web content to bypass security restrictions. This issue was limited to a specific set of stylesheets.

Affected configurations

Vulners
Node
mozillafirefoxRange<34
OR
mozillaseamonkeyRange<2.31
CPENameOperatorVersion
firefoxlt34
seamonkeylt2.31

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.006 Low

EPSS

Percentile

79.3%