The XPCVariant::VariantDataToJS function in the XPCOM implementation in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 does not enforce intended restrictions on interaction between chrome privileged code and objects obtained from remote web sites, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via unspecified method calls, related to "doubly-wrapped objects."
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9789 | vdb entry signature |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-272909-1 | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=505988 | |
http://www.mozilla.org/security/announce/2009/mfsa2009-57.html | patch vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6565 | vdb entry signature |
http://www.vupen.com/english/advisories/2009/3334 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:294 | vendor advisory |