Lucene search

K
mozillaMozilla FoundationMFSA2013-94
HistoryOct 29, 2013 - 12:00 a.m.

Spoofing addressbar though SELECT element — Mozilla

2013-10-2900:00:00
Mozilla Foundation
www.mozilla.org
23

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

76.5%

Security researcher Jordi Chancel discovered a method to put arbitrary HTML content within elements and place it in arbitrary locations. This can be used to spoof the displayed addressbar, leading to clickjacking and other spoofing attacks.

Affected configurations

Vulners
Node
mozillafirefoxRange<25
OR
mozillafirefox_esrRange<24.1
OR
mozillaseamonkeyRange<2.22
OR
mozillathunderbirdRange<24.1

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.005 Low

EPSS

Percentile

76.5%