Уязвимость выполнения произвольного JavaScript-кода с привилегиями Chrome через некорректное взаимодействие с ошибками методов InstallTrigger в продукции Mozilla
Описание
В реализации Chrome Object Wrapper (COW) в Mozilla Firefox, Thunderbird и SeaMonkey обнаружена уязвимость, связанная с некорректным взаимодействием с ошибками методов InstallTrigger
. Эта проблема, известная как "XrayWrapper pollution", позволяет злоумышленникам выполнять произвольный JavaScript код с привилегиями Chrome при помощи специально созданного веб-сайта.
Затронутые версии ПО
- Mozilla Firefox до версии 16.0
- Mozilla Firefox ESR 10.x до версии 10.0.8
- Mozilla Thunderbird до версии 16.0
- Mozilla Thunderbird ESR 10.x до версии 10.0.8
- Mozilla SeaMonkey до версии 2.13
Тип уязвимости
Удалённое выполнение кода
Ссылки
- Mailing ListThird Party Advisory
- Broken Link
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Issue TrackingVendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Mailing ListThird Party Advisory
- Broken Link
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
Одно из
EPSS
9.3 Critical
CVSS2
Дефекты
Связанные уязвимости
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an "XrayWrapper pollution" issue.
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an "XrayWrapper pollution" issue.
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox befo ...
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an "XrayWrapper pollution" issue.
EPSS
9.3 Critical
CVSS2