Lucene search

K
mozillaMozilla FoundationMFSA2006-21
HistoryApr 21, 2006 - 12:00 a.m.

JavaScript execution in mail when forwarding in-line — Mozilla

2006-04-2100:00:00
Mozilla Foundation
www.mozilla.org
20

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.95

Percentile

99.3%

Georgi Guninski reports that forwarding mail in-line while using the default HTML “rich mail” editor will execute JavaScript embedded in the e-mail message. Forwarding mail in-line is not the default setting but it is easily accessed through the “Forward As” menu item.

Affected configurations

Vulners
Node
mozillamozilla_suiteRange<1.7.13
OR
mozillaseamonkeyRange<1.0.1
OR
mozillathunderbirdRange<1.0.8
OR
mozillathunderbirdRange<1.5.0.2
VendorProductVersionCPE
mozillamozilla_suite*cpe:2.3:a:mozilla:mozilla_suite:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

EPSS

0.95

Percentile

99.3%