Уязвимость межсайтового скриптинга (XSS) через использование двоичного плагина в Mozilla Firefox, Thunderbird и SeaMonkey
Описание
в Mozilla Firefox, Thunderbird и SeaMonkey обнаружена уязвимость, которая позволяет злоумышленникам проводить атаки межсайтового скриптинга (XSS). Это достигается с помощью двоичного плагина, который использует метод Object.defineProperty
для замещения объекта top
, а также использует связь между top.location
и свойством location
.
Затронутые версии ПО
- Mozilla Firefox до версии 16.0
- Mozilla Firefox ESR 10.x до версии 10.0.8
- Mozilla Thunderbird до версии 16.0
- Mozilla Thunderbird ESR 10.x до версии 10.0.8
- SeaMonkey до версии 2.13
Тип уязвимости
Межсайтовый скриптинг (XSS)
Ссылки
- Third Party Advisory
- Broken Link
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Issue TrackingVendor Advisory
- Third Party Advisory
- Third Party Advisory
- Broken Link
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
EPSS
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.
Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.
Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbi ...
Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.
EPSS
4.3 Medium
CVSS2