Уязвимость обхода политики одного происхождения с помощью атак на объект Location в Mozilla Firefox, Thunderbird и SeaMonkey
Описание
в Mozilla Firefox, Thunderbird и SeaMonkey злоумышленники способны обойти политику одного происхождения и прочитать объект Location
с использованием атаки внедрения свойств прототипа. Это происходит из-за некорректной обработки механизмов защиты данного объекта.
Затронутые версии ПО
- Mozilla Firefox до версии 16.0.2
- Firefox ESR 10.x до версии 10.0.10
- Thunderbird до версии 16.0.2
- Thunderbird ESR 10.x до версии 10.0.10
- SeaMonkey до версии 2.13.2
Тип уязвимости
Обход политики одного происхождения
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
- ExploitIssue TrackingPatchVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
6.4 Medium
CVSS2
Дефекты
Связанные уязвимости
Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object.
Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object.
Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunde ...
Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object.
EPSS
6.4 Medium
CVSS2