CVE-2014-8632

The structured-clone implementation in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 does not properly interact with XrayWrapper property filtering, which allows remote attackers to bypass intended DOM object restrictions by leveraging property availability after XrayWrapper removal.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:19

Type Values Removed Values Added
References () http://www.mozilla.org/security/announce/2014/mfsa2014-91.html - Vendor Advisory () http://www.mozilla.org/security/announce/2014/mfsa2014-91.html - Vendor Advisory
References () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html -
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1050340 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1050340 -
References () https://security.gentoo.org/glsa/201504-01 - () https://security.gentoo.org/glsa/201504-01 -

Information

Published : 2014-12-11 11:59

Updated : 2024-11-21 02:19


NVD link : CVE-2014-8632

Mitre link : CVE-2014-8632

CVE.ORG link : CVE-2014-8632


JSON object : View

Products Affected

mozilla

  • firefox
  • seamonkey
CWE
CWE-284

Improper Access Control