Lucene search

K
mozillaMozilla FoundationMFSA2006-63
HistorySep 14, 2006 - 12:00 a.m.

JavaScript execution in mail via XBL — Mozilla

2006-09-1400:00:00
Mozilla Foundation
www.mozilla.org
20

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

EPSS

0.053

Percentile

93.1%

Georgi Guninski demonstrated that even with JavaScript disabled in mail (the default) an attacker can still execute JavaScript when a mail message is viewed, replied to, or forwarded by putting the script in a remote XBL file loaded by the message. The executed script could be used to alter or change the appearance of the message, and can act as a “mail-tap” to spy on the contents added to a reply or forward. For example, the attacker could make a provocative offer to a rival business and then watch the internal debate as it was forwarded and replied to.

Affected configurations

Vulners
Node
mozillaseamonkeyRange<1.0.5
OR
mozillathunderbirdRange<1.5.0.7

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

EPSS

0.053

Percentile

93.1%