SeaMonkey < 2.13.2 Multiple Vulnerabilities

low Nessus Network Monitor Plugin ID 6613

Synopsis

The remote host has a web browser installed that is vulnerable to multiple vulnerabilities.

Description

Versions of SeaMonkey prior to 2.13.2 are potentially affected by the following security issues :

- The true value of 'window.location' can be shadowed by user content through the use of the 'valueOf' method, which can be combined with some plugins to perform cross-site scripting attacks. (CVE-2012-4194)
- The 'CheckURL' function of 'window.location' can be forced to return the wrong calling document and principal, allowing a cross-site scripting attack. (CVE-2012-4195)
- It is possible to use property injection by prototype to bypass security wrapper protections on the 'Location' object, allowing the cross-origin reading of the 'Location' object. (CVE-2012-4196)

Solution

Upgrade to SeaMonkey 2.13.2 or later.

See Also

http://www.mozilla.org/security/announce/2012/mfsa2012-90.html

Plugin Details

Severity: Low

ID: 6613

Family: Web Clients

Published: 10/31/2012

Updated: 3/6/2019

Nessus ID: 62747

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:seamonkey

Patch Publication Date: 10/27/2012

Vulnerability Publication Date: 10/27/2012

Reference Information

CVE: CVE-2012-4194, CVE-2012-4195, CVE-2012-4196

BID: 56301, 56302, 56306