CVE-2012-4201Cross-site Scripting in Mozilla Firefox

Severity
4.3MEDIUMNVD
EPSS
2.0%
top 16.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 21
Latest updateMay 13

Description

The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.

CVSS vector

AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9

Affected Packages11 packages

NVDmozilla/firefox10.010.0.11+1
NVDmozilla/thunderbird_esr10.010.0.11
NVDmozilla/seamonkey< 2.14
NVDopensuse/opensuse11.4, 12.1, 12.2+2

Also affects: Debian Linux 6.0, 7.0, Ubuntu Linux 10.04, 11.10, 12.04, 12.10, Enterprise Linux 6.3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6fwr-vrgr-xcw8: The evalInSandbox implementation in Mozilla Firefox before 172022-05-13
CVEList
CVE-2012-4201: The evalInSandbox implementation in Mozilla Firefox before 172012-11-21

📋Vendor Advisories

3
Ubuntu
Firefox vulnerabilities2012-11-21
Ubuntu
Thunderbird vulnerabilities2012-11-21
Red Hat
Mozilla: evalInSanbox location context incorrectly applied (MFSA 2012-93)2012-11-20

💬Community

1
Bugzilla
CVE-2012-4201 Mozilla: evalInSanbox location context incorrectly applied (MFSA 2012-93)2012-11-17
CVE-2012-4201 — Cross-site Scripting in Mozilla Firefox | cvebase