Cross-site scripting (XSS) vulnerability in Mozilla Thunderbird 17.x through 17.0.8, Thunderbird ESR 17.x through 17.0.10, and SeaMonkey before 2.20 allows user-assisted remote attackers to inject arbitrary web script or HTML via an e-mail message containing a data: URL in an IFRAME element, a related issue to CVE-2014-2018.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.ubuntu.com/usn/USN-2119-1 | vendor advisory |
http://seclists.org/fulldisclosure/2014/Jan/182 | mailing list exploit |
http://osvdb.org/102566 | vdb entry |
http://www.securitytracker.com/id/1029773 | vdb entry |
http://www.mozilla.org/security/announce/2014/mfsa2014-14.html | vendor advisory |
http://www.kb.cert.org/vuls/id/863369 | third party advisory us government resource |
http://packetstormsecurity.com/files/124965/Mozilla-Thunderbird-Filter-Bypass.html | exploit |
http://www.securitytracker.com/id/1029774 | vdb entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=868267 |