Lucene search

K
mozillaMozilla FoundationMFSA2009-02
HistoryFeb 03, 2009 - 12:00 a.m.

XSS using a chrome XBL method and window.eval — Mozilla

2009-02-0300:00:00
Mozilla Foundation
www.mozilla.org
23

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

69.6%

Mozilla security researcher moz_bug_r_a4 reported that a chrome XBL method can be used in conjuction with window.eval to execute arbitrary JavaScript within the context of another website, violating the same origin policy.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.0.6
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

CVSS2

2.6

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

69.6%