Mozilla Foundation Security Advisory 2013-68
Document URI misrepresentation and masquerading
- August 6, 2013
- Firefox, Firefox ESR, SeaMonkey, Thunderbird, Thunderbird ESR
- Fixed in
- Firefox 23
- Firefox ESR 17.0.8
- SeaMonkey 2.20
- Thunderbird 17.0.8
- Thunderbird ESR 17.0.8
Mozilla security researcher moz_bug_r_a4 reported that through an interaction of frames and browser history it was possible to make the browser believe attacker-supplied content came from the location of a previous page in browser history. This allows for cross-site scripting (XSS) attacks by loading scripts from a misrepresented malicious site through relative locations and the potential access of stored credentials of a spoofed site.
In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products.