Lucene search

K
mozillaMozilla FoundationMFSA2012-75
HistoryOct 09, 2012 - 12:00 a.m.

select element persistance allows for attacks — Mozilla

2012-10-0900:00:00
Mozilla Foundation
www.mozilla.org
19

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.013 Low

EPSS

Percentile

85.9%

Security researcher David Bloom of Cue discovered that elements are always-on-top chromeless windows and that navigation away from a page with an active menu does not remove this window.When another menu is opened programmatically on a new page, the original menu can be retained and arbitrary HTML content within it rendered, allowing an attacker to cover arbitrary portions of the new page through absolute positioning/scrolling, leading to spoofing attacks. Security researcher Jordi Chancel found a variation that would allow for click-jacking attacks was well.

Affected configurations

Vulners
Node
mozillafirefoxRange<16
OR
mozillaseamonkeyRange<2.13
OR
mozillathunderbirdRange<16
CPENameOperatorVersion
firefoxlt16
seamonkeylt2.13
thunderbirdlt16

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.013 Low

EPSS

Percentile

85.9%