Уязвимость выполнения произвольного JavaScript-кода и межсайтового скриптинга (XSS) в Mozilla Firefox, Thunderbird и SeaMonkey через некорректное определение вызывающего документа в функции nsLocation::CheckURL
Описание
Функция nsLocation::CheckURL
в браузерах Mozilla Firefox и SeaMonkey, а также в почтовом клиенте Thunderbird, некорректно определяет вызывающий документ и главный объект в возвращаемом значении. Это упрощает злоумышленникам проведение XSS атак через специально созданный веб-сайт. Также это упрощает злоумышленникам выполнение произвольного JavaScript-кода за счет использования определенного поведения дополнительных модулей.
Затронутые версии ПО
- Mozilla Firefox версии до 16.0.2
- Firefox ESR версии 10.x до 10.0.10
- Thunderbird версии до 16.0.2
- Thunderbird ESR версии 10.x до 10.0.10
- SeaMonkey версии до 2.13.2
Тип уязвимости
- Межсайтовый скриптинг (XSS)
- Выполнение произвольного кода
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
- Issue TrackingVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.
The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.
The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Fi ...
The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.
EPSS
4.3 Medium
CVSS2