Mozilla Foundation Security Advisory 2010-06
Scriptable plugin execution in SeaMonkey mail
- Announced
- March 16, 2010
- Reporter
- Georgi Guninski
- Impact
- Critical
- Products
- SeaMonkey
- Fixed in
-
- SeaMonkey 1.1.19
Description
Security researcher Georgi Guninski reported that scriptable plugin content, such as Flash objects, could be loaded and executed in SeaMonkey mail messages by embedding the content in an iframe inside the message. If a user were to reply to or forward such a message, malicious JavaScript embedded in the plugin content could potentially steal the contents of the message or files from the local filesystem.
Thunderbird was not affected by this issue.