Vulnerability Description
The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 29.0 |
| Mozilla | Seamonkey | < 2.26 |
| Mozilla | Thunderbird | < 24.5 |
| Fedoraproject | Fedora | 19 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 7.0 |
| Redhat | Enterprise Linux Desktop | 5.0 |
| Redhat | Enterprise Linux Eus | 6.5 |
| Redhat | Enterprise Linux Server | 5.0 |
| Redhat | Enterprise Linux Server Aus | 6.5 |
| Redhat | Enterprise Linux Server Eus | 6.5 |
| Redhat | Enterprise Linux Server Tus | 6.5 |
| Redhat | Enterprise Linux Workstation | 5.0 |
| Opensuse | Opensuse | 11.4 |
| Suse | Suse Linux Enterprise Server | 10 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132332.htmlMailing ListThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132437.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00006.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2014-05/msg00015.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00010.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00013.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00033.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00040.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2014-0448.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2014-0449.htmlThird Party Advisory
- http://secunia.com/advisories/59866Broken Link
- http://www.debian.org/security/2014/dsa-2918Third Party Advisory
- http://www.debian.org/security/2014/dsa-2924Third Party Advisory
- http://www.mozilla.org/security/announce/2014/mfsa2014-43.htmlVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlThird Party Advisory
FAQ
What is CVE-2014-1530?
CVE-2014-1530 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL wit...
How severe is CVE-2014-1530?
CVE-2014-1530 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1530?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Mozilla Seamonkey, Mozilla Thunderbird, Fedoraproject Fedora, Canonical Ubuntu Linux.