The structured-clone implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 does not properly interact with XrayWrapper property filtering, which allows remote attackers to bypass intended DOM object restrictions by leveraging property availability after XrayWrapper removal.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.mozilla.org/security/announce/2014/mfsa2014-91.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1050340 - | |
References | () https://security.gentoo.org/glsa/201504-01 - |
Information
Published : 2014-12-11 11:59
Updated : 2024-11-21 02:19
NVD link : CVE-2014-8632
Mitre link : CVE-2014-8632
CVE.ORG link : CVE-2014-8632
JSON object : View
Products Affected
mozilla
- firefox
- seamonkey
CWE
CWE-284
Improper Access Control