Lucene search

K
mozillaMozilla FoundationMFSA2015-27
HistoryFeb 24, 2015 - 12:00 a.m.

Caja Compiler JavaScript sandbox bypass — Mozilla

2015-02-2400:00:00
Mozilla Foundation
www.mozilla.org
24

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

73.5%

Mozilla developer Jan de Mooij reported an issue that affects web content that relies on the Caja Compiler for protection, or other similar sandboxing libraries. He found that some JavaScript objects marked as non-extensible within Caja and Secure EcmaScript could be made extensible again, bypassing the Caja sandboxing security measures, when the JavaScript code should not be allowed to run.

Affected configurations

Vulners
Node
mozillafirefoxRange<36
OR
mozillaseamonkeyRange<2.33
CPENameOperatorVersion
firefoxlt36
seamonkeylt2.33

2.6 Low

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

0.004 Low

EPSS

Percentile

73.5%