Lucene search

K
mozillaMozilla FoundationMFSA2010-76
HistoryDec 09, 2010 - 12:00 a.m.

Chrome privilege escalation with window.open and <isindex> element — Mozilla

2010-12-0900:00:00
Mozilla Foundation
www.mozilla.org
15

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

9.5

Confidence

High

EPSS

0.015

Percentile

87.0%

Security researcher echo reported that a web page could open a window with an about:blank location and then inject an element into that page which upon submission would redirect to a chrome: document. The effect of this defect was that the original page would wind up with a reference to a chrome-privileged object, the opened window, which could be leveraged for privilege escalation attacks.

Affected configurations

Vulners
Node
mozillafirefoxRange<3.5.16
OR
mozillafirefoxRange<3.6.13
OR
mozillaseamonkeyRange<2.0.11
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

9.5

Confidence

High

EPSS

0.015

Percentile

87.0%