7.5
CVSSv2

CVE-2014-1485

Published: 06/02/2014 Updated: 14/02/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Content Security Policy (CSP) implementation in Mozilla Firefox prior to 27.0 and SeaMonkey prior to 2.24 operates on XSLT stylesheets according to style-src directives instead of script-src directives, which might allow remote malicious users to execute arbitrary XSLT code by leveraging insufficient style-src restrictions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla seamonkey

mozilla firefox

oracle solaris 11.3

canonical ubuntu linux 13.10

canonical ubuntu linux 12.10

canonical ubuntu linux 12.04

suse linux enterprise desktop 11

suse linux enterprise server 11

opensuse opensuse 12.3

suse linux enterprise software development kit 11

opensuse opensuse 11.4

opensuse opensuse 13.1

Vendor Advisories

Firefox could be made to crash or run programs as your login if it opened a malicious website ...
USN-2102-1 introduced a regression in Firefox ...
Mozilla Foundation Security Advisory 2014-07 XSLT stylesheets treated as styles in Content Security Policy Announced February 4, 2014 Reporter Frederik Braun Impact Moderate Products Firefox, SeaMonkey Fixed in ...
The Content Security Policy (CSP) implementation in Mozilla Firefox before 270 and SeaMonkey before 224 operates on XSLT stylesheets according to style-src directives instead of script-src directives, which might allow remote attackers to execute arbitrary XSLT code by leveraging insufficient style-src restrictions ...