Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-4149 | Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on. |
Ubuntu USN |
USN-1636-1 | Thunderbird vulnerabilities |
Ubuntu USN |
USN-1638-1 | Firefox vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T20:28:07.580Z
Reserved: 2012-08-08T00:00:00
Link: CVE-2012-4205
No data.
Status : Deferred
Published: 2012-11-21T12:55:01.837
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-4205
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN