Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:23560
HistoryApr 06, 2010 - 12:00 a.m.

Mozilla Foundation Security Advisory 2010-21

2010-04-0600:00:00
vulners.com
19

Mozilla Foundation Security Advisory 2010-21

Title: Arbitrary code execution with Firebug XMLHttpRequestSpy
Impact: High
Announced: March 30, 2010
Reporter: moz_bug_r_a4
Products: Firefox, SeaMonkey

Fixed in: Firefox 3.5.8
Firefox 3.0.19
SeaMonkey 2.0.3
Description

Mozilla security researcher moz_bug_r_a4 reported that the XMLHttpRequestSpy module in the Firebug add-on was exposing an underlying chrome privilege escalation vulnerability. When the XMLHttpRequestSpy object was created, it would attach various properties of itself to objects defined in web content, which were not being properly wrapped to prevent their exposure to chrome privileged objects. This could result in an attacker running arbitrary JavaScript on a victim's machine, though it required the victim to have Firebug installed, so the overall severity of the issue was determined to be High.

This vulnerability does not affect Firefox 3.6
References

* https://bugzilla.mozilla.org/show_bug.cgi?id=504021
* CVE-2010-0179