CVE-2013-1670
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
16/05/2013
Last modified:
11/04/2025
Description
The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (XSS) attacks via a crafted web site.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* | 20.0.1 (including) | |
| cpe:2.3:a:mozilla:firefox:19.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:19.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:19.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:20.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:17.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:17.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:17.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:17.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:17.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:firefox:17.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* | 17.0.5 (including) | |
| cpe:2.3:a:mozilla:thunderbird:17.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:thunderbird:17.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mozilla:thunderbird:17.0.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2013-0820.html
- http://rhn.redhat.com/errata/RHSA-2013-0821.html
- http://www.debian.org/security/2013/dsa-2699
- http://www.exploit-db.com/exploits/34363
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A165
- http://www.mozilla.org/security/announce/2013/mfsa2013-42.html
- http://www.osvdb.org/93427
- http://www.securityfocus.com/bid/59865
- http://www.ubuntu.com/usn/USN-1822-1
- http://www.ubuntu.com/usn/USN-1823-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=853709
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17046
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2013-0820.html
- http://rhn.redhat.com/errata/RHSA-2013-0821.html
- http://www.debian.org/security/2013/dsa-2699
- http://www.exploit-db.com/exploits/34363
- http://www.mandriva.com/security/advisories?name=MDVSA-2013%3A165
- http://www.mozilla.org/security/announce/2013/mfsa2013-42.html
- http://www.osvdb.org/93427
- http://www.securityfocus.com/bid/59865
- http://www.ubuntu.com/usn/USN-1822-1
- http://www.ubuntu.com/usn/USN-1823-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=853709
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17046



