Lucene search

K
mozillaMozilla FoundationMFSA2012-70
HistoryAug 28, 2012 - 12:00 a.m.

Location object security checks bypassed by chrome code — Mozilla

2012-08-2800:00:00
Mozilla Foundation
www.mozilla.org
32

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

87.3%

Mozilla security researcher moz_bug_r_a4 reported that certain security checks in the location object can be bypassed if chrome code is called content in a specific manner. This allowed for the loading of restricted content. This can be combined with other issues to become potentially exploitable.

Affected configurations

Vulners
Node
mozillafirefoxRange<15
OR
mozillafirefox_esrRange<10.0.7
OR
mozillaseamonkeyRange<2.12
OR
mozillathunderbirdRange<15
OR
mozillathunderbird_esrRange<10.0.7

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

87.3%