Mozilla Foundation Security Advisory 2014-02
Title: Clone protected content with XBL
Announced: February 4, 2014
Reporter: Cody Crews
Products: Firefox, Thunderbird, Seamonkey
Fixed in: Firefox 27
Firefox ESR 24.3
Security researcher Cody Crews reported a method to bypass System Only Wrappers (SOW) by using XML Binding Language (XBL) content scopes to clone protected XUL elements. This could be used to clone anonymous nodes, making trusted XUL content web accessible.
In general this flaw cannot be exploited through email in the Thunderbird and Seamonkey products because scripting is disabled in mail, but is potentially a risk in browser or browser-like contexts.