Lucene search

K
mozillaMozilla FoundationMFSA2012-03
HistoryJan 31, 2012 - 12:00 a.m.

<iframe> element exposed across domains via name attribute — Mozilla

2012-01-3100:00:00
Mozilla Foundation
www.mozilla.org
34

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

AI Score

9.2

Confidence

High

EPSS

0.012

Percentile

84.9%

Vitaly Nevgen reported that an attacker could replace a sub-frame in another domain’s document by using the name attribute of the sub-frame as a form submission target. This can potentially allow for phishing attacks against users and violates the HTML5 frame navigation policy.

Affected configurations

Vulners
Node
mozillafirefoxRange<10
OR
mozillaseamonkeyRange<2.7
OR
mozillathunderbirdRange<10
VendorProductVersionCPE
mozillafirefox*cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*
mozillathunderbird*cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

AI Score

9.2

Confidence

High

EPSS

0.012

Percentile

84.9%