The XrayWrapper implementation in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that is visited in the debugger, leading to unwrapping operations and calls to DOM methods on the unwrapped objects.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.html | mailing list third party advisory vendor advisory |
http://www.mozilla.org/security/announce/2014/mfsa2014-47.html | vendor advisory |
https://security.gentoo.org/glsa/201504-01 | third party advisory vendor advisory |
http://secunia.com/advisories/59866 | third party advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | third party advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=988106 | issue tracking patch vendor advisory |
http://www.ubuntu.com/usn/USN-2185-1 | third party advisory vendor advisory |
http://www.securitytracker.com/id/1030164 | vdb entry third party advisory |
http://www.securitytracker.com/id/1030163 | vdb entry third party advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.html | third party advisory vendor advisory |