Lucene search

K
mozillaMozilla FoundationMFSA2010-69
HistoryOct 19, 2010 - 12:00 a.m.

Cross-site information disclosure via modal calls β€” Mozilla

2010-10-1900:00:00
Mozilla Foundation
www.mozilla.org
24

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

EPSS

0.005

Percentile

76.2%

Security researcher Eduardo Vela Nava reported that if a web page opened a new window and used a javascript: URL to make a modal call, such as alert(), then subsequently navigated the page to a different domain, once the modal call returned the opener of the window could get access to objects in the navigated window. This is a violation of the same-origin policy and could be used by an attacker to steal information from another web site.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.5.14
OR
mozillafirefoxRange<3.6.11
OR
mozillaseamonkeyRange<2.0.9
OR
mozillathunderbirdRange<3.0.9
OR
mozillathunderbirdRange<3.1.5
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

EPSS

0.005

Percentile

76.2%