Lucene search

K
mozillaMozilla FoundationMFSA2010-21
HistoryMar 30, 2010 - 12:00 a.m.

Arbitrary code execution with Firebug XMLHttpRequestSpy β€” Mozilla

2010-03-3000:00:00
Mozilla Foundation
www.mozilla.org
27

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.013

Percentile

85.9%

Mozilla security researcher moz_bug_r_a4 reported that the XMLHttpRequestSpy module in the Firebug add-on was exposing an underlying chrome privilege escalation vulnerability. When the XMLHttpRequestSpy object was created, it would attach various properties of itself to objects defined in web content, which were not being properly wrapped to prevent their exposure to chrome privileged objects. This could result in an attacker running arbitrary JavaScript on a victim’s machine, though it required the victim to have Firebug installed, so the overall severity of the issue was determined to be High.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.0.19
OR
mozillafirefoxRange<3.5.8
OR
mozillaseamonkeyRange<2.0.3
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.013

Percentile

85.9%