Уязвимость межсайтового скриптинга (XSS) в Mozilla Firefox, Thunderbird и SeaMonkey через некорректную обработку свойства location с использованием двоичного плагина
Описание
в Mozilla Firefox, Thunderbird и SeaMonkey обнаружена уязвимость, связанная с некорректной обработкой значения атрибута name
фрейма top
для доступа к свойству location. Это упрощает злоумышленникам проведение атак межсайтового скриптинга (XSS) с использованием двоичных плагинов.
Затронутые версии ПО
- Mozilla Firefox версии до 17.0
- Mozilla Firefox ESR 10.x версии до 10.0.11
- Mozilla Thunderbird версии до 17.0
- Mozilla Thunderbird ESR 10.x версии до 10.0.11
- SeaMonkey версии до 2.14
Тип уязвимости
Межсайтовый скриптинг (XSS)
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
EPSS
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.
Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.
Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderb ...
Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.
EPSS
4.3 Medium
CVSS2