Уязвимость обхода ограничений песочницы через некорректную обработку атрибута sandbox в Mozilla Firefox и SeaMonkey
Описание
Уязвимость заключена в том, что Mozilla Firefox и SeaMonkey некорректно обрабатывают атрибут sandbox
элемента IFRAME
во время обработки содержащегося в нём элемента OBJECT
. Это позволяет злоумышленникам обойти установленные ограничения песочницы через специально подготовленный веб-сайт.
Затронутые версии ПО
- Mozilla Firefox до версии 26.0
- SeaMonkey до версии 2.23
Тип уязвимости
Обход ограничений песочницы
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Third Party Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Issue TrackingVendor Advisory
- Third Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
Одно из
Одно из
EPSS
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly ...
Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
EPSS
4.3 Medium
CVSS2