4.3
CVSSv2

CVE-2013-1714

Published: 07/08/2013 Updated: 19/09/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The Web Workers implementation in Mozilla Firefox prior to 23.0, Firefox ESR 17.x prior to 17.0.8, Thunderbird prior to 17.0.8, Thunderbird ESR 17.x prior to 17.0.8, and SeaMonkey prior to 2.20 does not properly restrict XMLHttpRequest calls, which allows remote malicious users to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via unspecified vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla seamonkey 2.19

mozilla seamonkey 2.0

mozilla seamonkey 2.0.11

mozilla seamonkey 2.0.12

mozilla seamonkey 2.20

mozilla seamonkey 2.0.1

mozilla seamonkey 2.0.10

mozilla seamonkey 2.0.5

mozilla seamonkey 2.0.6

mozilla seamonkey 2.1

mozilla seamonkey 2.10

mozilla seamonkey 2.11

mozilla seamonkey 2.12

mozilla seamonkey 2.12.1

mozilla seamonkey 2.13

mozilla seamonkey 2.13.1

mozilla seamonkey 2.13.2

mozilla seamonkey 2.15

mozilla seamonkey 2.16

mozilla seamonkey 2.17

mozilla seamonkey 2.3

mozilla seamonkey 2.4

mozilla seamonkey 2.6

mozilla seamonkey 2.7

mozilla seamonkey 2.8

mozilla seamonkey 2.9

mozilla seamonkey 2.9.1

mozilla seamonkey 2.18

mozilla seamonkey 2.0.13

mozilla seamonkey 2.0.14

mozilla seamonkey 2.0.2

mozilla seamonkey 2.0.9

mozilla seamonkey 2.14

mozilla seamonkey 2.2

mozilla seamonkey 2.3.1

mozilla seamonkey 2.3.2

mozilla seamonkey 2.5

mozilla seamonkey 2.6.1

mozilla seamonkey 2.7.1

mozilla seamonkey 2.7.2

mozilla seamonkey 2.0.7

mozilla seamonkey 2.0.8

mozilla seamonkey 2.10.1

mozilla seamonkey 2.4.1

mozilla seamonkey

mozilla seamonkey 2.17.1

mozilla seamonkey 2.0.3

mozilla seamonkey 2.0.4

mozilla seamonkey 2.15.1

mozilla seamonkey 2.15.2

mozilla seamonkey 2.16.1

mozilla seamonkey 2.16.2

mozilla seamonkey 2.3.3

mozilla firefox esr 17.0.4

mozilla firefox esr 17.0.5

mozilla firefox esr 17.0.2

mozilla firefox esr 17.0.1

mozilla firefox esr 17.0.7

mozilla firefox esr 17.0.6

mozilla firefox esr 17.0

mozilla firefox esr 17.0.3

mozilla thunderbird 17.0.3

mozilla thunderbird 17.0.4

mozilla thunderbird

mozilla thunderbird 17.0.2

mozilla thunderbird 17.0.5

mozilla thunderbird 17.0.6

mozilla thunderbird 17.0

mozilla thunderbird 17.0.1

mozilla firefox 20.0

mozilla firefox

mozilla firefox 19.0

mozilla firefox 20.0.1

mozilla firefox 21.0

mozilla firefox 19.0.1

mozilla firefox 19.0.2

mozilla thunderbird esr 17.0.7

mozilla thunderbird esr 17.0

mozilla thunderbird esr 17.0.3

mozilla thunderbird esr 17.0.4

mozilla thunderbird esr 17.0.5

mozilla thunderbird esr 17.0.6

mozilla thunderbird esr 17.0.1

mozilla thunderbird esr 17.0.2

Vendor Advisories

Multiple security issues have been found in Iceweasel, Debian's version of the Mozilla Firefox web browser: multiple memory safety errors, missing permission checks and other implementation errors may lead to the execution of arbitrary code, cross-site scripting, privilege escalation, bypass of the same-origin policy or the installation of maliciou ...
Firefox could be made to crash or run programs as your login if it opened a malicious website ...
Several security issues were fixed in Thunderbird ...
This update provides compatible packages for Firefox 23 ...
Mozilla Foundation Security Advisory 2013-73 Same-origin bypass with web workers and XMLHttpRequest Announced August 6, 2013 Reporter Federico Lanusse Impact High Products Firefox, Firefox ESR, SeaMonkey, Thunderbird, Thunde ...
The Web Workers implementation in Mozilla Firefox before 230, Firefox ESR 17x before 1708, Thunderbird before 1708, Thunderbird ESR 17x before 1708, and SeaMonkey before 220 does not properly restrict XMLHttpRequest calls, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via uns ...