Mozilla Foundation Security Advisory 2013-38
Cross-site scripting (XSS) using timed history navigations
- Announced
- April 2, 2013
- Reporter
- Mariusz Mlynski
- Impact
- High
- Products
- Firefox, Firefox ESR, SeaMonkey, Thunderbird, Thunderbird ESR
- Fixed in
-
- Firefox 20
- Firefox ESR 17.0.5
- SeaMonkey 2.17
- Thunderbird 17.0.5
- Thunderbird ESR 17.0.5
Description
Security researcher Mariusz Mlynski reported a method to use browser navigations through history to load an arbitrary website with that page's baseURI property pointing to another site instead of the seemingly loaded one. The user will continue to see the incorrect site in the addressbar of the browser. This allows for a cross-site scripting (XSS) attack or the theft of data through a phishing attack.
In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products.