Lucene search

K
mozillaMozilla FoundationMFSA2010-12
HistoryMar 23, 2010 - 12:00 a.m.

XSS using addEventListener and setTimeout on a wrapped object — Mozilla

2010-03-2300:00:00
Mozilla Foundation
www.mozilla.org
14

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

68.9%

Mozilla security researcher moz_bug_r_a4 reports that by using an appropriately wrapped object it was possible to bypass the fix for MFSA 2007-19. Prior to Firefox 3.6 this gives an attacker the ability to perform cross-site scripting attacks against arbitrary sites as in the original MFSA 2007-19 attack. Due to unrelated changes in the browser engine used by Firefox 3.6, attacks in that version are limited to capturing keystroke events from a cross-origin frame or window rather than full DOM access. Those events might be sufficient to illicitly obtain passwords or other sensitive information entered into web forms.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.0.18
OR
mozillafirefoxRange<3.5.8
OR
mozillafirefoxRange<3.6.2
OR
mozillaseamonkeyRange<2.0.3
OR
mozillathunderbirdRange<3.0.2

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

68.9%