MEDIUM · 6.8

CVE-2012-4205

Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which al...

Vulnerability Description

Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.

CVSS Score

6.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
MozillaFirefox< 17.0
MozillaSeamonkey< 2.14
MozillaThunderbird< 17.0
CanonicalUbuntu Linux10.04
OpensuseOpensuse11.4
SuseLinux Enterprise Desktop10
SuseLinux Enterprise Server10
SuseLinux Enterprise Software Development Kit11

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-4205?

CVE-2012-4205 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which al...

How severe is CVE-2012-4205?

CVE-2012-4205 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-4205?

Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird, Canonical Ubuntu Linux, Opensuse Opensuse.