Firefox 10.x < 10.0.10 Multiple Vulnerabilities

medium Nessus Plugin ID 62743

Synopsis

The remote Windows host contains a web browser that is affected by multiple vulnerabilities.

Description

The installed version of Firefox 10.x is potentially affected by the following security issues :
- The true value of 'window.location' can be shadowed by user content through the use of the 'valueOf' method, which can be combined with some plugins to perform cross-site scripting attacks. (CVE-2012-4194)

- The 'CheckURL' function of 'window.location' can be forced to return the wrong calling document and principal, allowing a cross-site scripting attack.
(CVE-2012-4195)

- It is possible to use property injection by prototype to bypass security wrapper protections on the 'Location' object, allowing the cross-origin reading of the 'Location' object. (CVE-2012-4196)

Solution

Upgrade to Firefox 10.0.10 ESR or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2012-90/

Plugin Details

Severity: Medium

ID: 62743

File Name: mozilla_firefox_10010.nasl

Version: 1.11

Type: local

Agent: windows

Family: Windows

Published: 10/29/2012

Updated: 12/4/2019

Supported Sensors: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 3.8

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2012-4195

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: Mozilla/Firefox/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 10/26/2012

Vulnerability Publication Date: 10/26/2012

Reference Information

CVE: CVE-2012-4194, CVE-2012-4195, CVE-2012-4196

BID: 56301, 56302, 56306

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990