Lucene search

K
mozillaMozilla FoundationMFSA2006-19
HistoryApr 13, 2006 - 12:00 a.m.

Cross-site scripting using .valueOf.call() — Mozilla

2006-04-1300:00:00
Mozilla Foundation
www.mozilla.org
21

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.205

Percentile

96.4%

moz_bug_r_a4 discovered that .valueOf.call() and .valueOf.apply() when called with no arguments were returning the Object class prototype rather than the caller’s global window object. When called on a reachable property of another window this provides a hook to get around the same-origin protection, allowing an attacker to inject script into another window.

Affected configurations

Vulners
Node
mozillafirefoxRange<1.0.8
OR
mozillafirefoxRange<1.5
OR
mozillamozilla_suiteRange<1.7.13
OR
mozillaseamonkeyRange<1
OR
mozillathunderbirdRange<1.0.8
OR
mozillathunderbirdRange<1.5
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillamozilla_suite*cpe:2.3:a:mozilla:mozilla_suite:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.205

Percentile

96.4%