First published: Wed Nov 21 2012(Updated: )
Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <17.0 | |
Mozilla SeaMonkey | <2.14 | |
Mozilla Thunderbird | <17.0 | |
Canonical Ubuntu Linux | =10.04 | |
Canonical Ubuntu Linux | =11.10 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =12.10 | |
openSUSE openSUSE | =11.4 | |
openSUSE openSUSE | =12.1 | |
openSUSE openSUSE | =12.2 | |
SUSE Linux Enterprise Desktop | =10-sp4 | |
SUSE Linux Enterprise Desktop | =11-sp2 | |
SUSE Linux Enterprise Server | =10-sp4 | |
SUSE Linux Enterprise Server | =11-sp2 | |
Suse Linux Enterprise Server | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =11-sp2 | |
SUSE Linux Enterprise Software Development Kit | =11-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.