First published: Thu Dec 11 2014(Updated: )
The structured-clone implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 does not properly interact with XrayWrapper property filtering, which allows remote attackers to bypass intended DOM object restrictions by leveraging property availability after XrayWrapper removal.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=33.0 | |
Mozilla SeaMonkey | <=2.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8632 has been classified as a medium-severity vulnerability.
To remediate CVE-2014-8632, upgrade Mozilla Firefox to version 34.0 or later, or SeaMonkey to version 2.31 or later.
CVE-2014-8632 affects Mozilla Firefox versions prior to 34.0.
CVE-2014-8632 affects SeaMonkey versions prior to 2.31.
CVE-2014-8632 allows remote attackers to bypass intended DOM object restrictions.