You are here: Security Center > Mozilla Foundation Security Advisories > MFSA 2014-02

Mozilla Foundation Security Advisory 2014-02

Title: Clone protected content with XBL scopes
Impact: High
Announced: February 4, 2014
Reporter: Cody Crews
Products: Firefox, Thunderbird, Seamonkey

Fixed in: Firefox 27
  Firefox ESR 24.3
  Thunderbird 24.3
  Seamonkey 2.24


Security researcher Cody Crews reported a method to bypass System Only Wrappers (SOW) by using XML Binding Language (XBL) content scopes to clone protected XUL elements. This could be used to clone anonymous nodes, making trusted XUL content web accessible.

In general this flaw cannot be exploited through email in the Thunderbird and Seamonkey products because scripting is disabled in mail, but is potentially a risk in browser or browser-like contexts.