Уязвимость выполнения произвольного XSLT кода в Mozilla Firefox и SeaMonkey из-за некорректной обработки директив Content Security Policy (CSP)
Описание
В реализации Content Security Policy (CSP) в Mozilla Firefox и SeaMonkey наблюдается некорректное применение директив style-src
вместо script-src
к XSLT стилям. Эта уязвимость позволяет злоумышленнику выполнять произвольный XSLT код, используя недостаточные ограничения style-src
.
Затронутые версии ПО
- Mozilla Firefox до версии 27.0
- SeaMonkey до версии 2.24
Тип уязвимости
Удалённое выполнение кода
Ссылки
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Mailing ListThird Party Advisory
- Broken Link
- Broken Link
- Broken Link
- Broken Link
- Broken Link
- Vendor Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
- Broken LinkURL Repurposed
- Issue TrackingVendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Mailing ListThird Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
EPSS
7.5 High
CVSS2
Дефекты
Связанные уязвимости
The Content Security Policy (CSP) implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 operates on XSLT stylesheets according to style-src directives instead of script-src directives, which might allow remote attackers to execute arbitrary XSLT code by leveraging insufficient style-src restrictions.
The Content Security Policy (CSP) implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 operates on XSLT stylesheets according to style-src directives instead of script-src directives, which might allow remote attackers to execute arbitrary XSLT code by leveraging insufficient style-src restrictions.
The Content Security Policy (CSP) implementation in Mozilla Firefox be ...
The Content Security Policy (CSP) implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 operates on XSLT stylesheets according to style-src directives instead of script-src directives, which might allow remote attackers to execute arbitrary XSLT code by leveraging insufficient style-src restrictions.
Уязвимость в программном продукте Mozilla SeaMonkey, позволяющая злоумышленнику выполнить произвольный код
EPSS
7.5 High
CVSS2