Уязвимость межсайтового скриптинга (XSS) и чтения произвольных файлов в Mozilla Firefox, Thunderbird и SeaMonkey через некорректную обработку JavaScript-кода в evalInSandbox
Описание
Реализация функции evalInSandbox
в программном обеспечении Mozilla Firefox, Thunderbird и SeaMonkey некорректно обрабатывает контекст при работе с JavaScript-кодом, который устанавливает свойство location.href
. Эта уязвимость позволяет злоумышленникам осуществлять атаки межсайтового скриптинга (XSS) или читать произвольные файлы, используя изолированное дополнение (sandboxed add-on).
Затронутые версии ПО
- Mozilla Firefox до версии 17.0
- Mozilla Firefox ESR 10.x до версии 10.0.11
- Thunderbird до версии 17.0
- Thunderbird ESR 10.x до версии 10.0.11
- SeaMonkey до версии 2.14
Тип уязвимости
- Межсайтовый скриптинг (XSS)
- Чтение произвольных файлов
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Broken Link
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
Одно из
EPSS
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
The evalInSandbox implementation in Mozilla Firefox before 17.0, Firef ...
The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
EPSS
4.3 Medium
CVSS2