Mozilla

mozilla

Mozilla Foundation Security Advisory 2014-02

Clone protected content with XBL scopes

Announced
February 4, 2014
Reporter
Cody Crews
Impact
High
Products
Firefox, Firefox ESR, SeaMonkey, Thunderbird
Fixed in
  • Firefox 27
  • Firefox ESR 24.3
  • SeaMonkey 2.24
  • Thunderbird 24.3

Description

Security researcher Cody Crews reported a method to bypass System Only Wrappers (SOW) by using XML Binding Language (XBL) content scopes to clone protected XUL elements. This could be used to clone anonymous nodes, making trusted XUL content web accessible.

In general this flaw cannot be exploited through email in the Thunderbird and Seamonkey products because scripting is disabled in mail, but is potentially a risk in browser or browser-like contexts.

References