CVE-2008-5022

CVSS V2 High 7.5 CVSS V3 None
Description
The nsXMLHttpRequest::NotifyEventListeners method in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the same-origin policy and execute arbitrary script via multiple listeners, which bypass the inner window check.
Overview
  • CVE ID
  • CVE-2008-5022
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2008-11-13T11:30:01
  • Last Modified Date
  • 2018-11-02T13:49:30
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* 1 OR 2.0 2.0.0.18
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* 1 OR 3.0 3.0.4
cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:* 1 OR 1.0 1.1.13
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:* 1 OR 2.0 2.0.0.18
cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 7.5
  • Severity
  • HIGH
  • Exploitability Score
  • 10
  • Impact Score
  • 6.4
References
Reference URL Reference Tags
https://bugzilla.mozilla.org/show_bug.cgi?id=460002 Issue Tracking Vendor Advisory
http://www.mozilla.org/security/announce/2008/mfsa2008-56.html Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:228 Third Party Advisory
http://www.securityfocus.com/bid/32281 Third Party Advisory VDB Entry
http://secunia.com/advisories/32721 Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html Third Party Advisory
http://www.us-cert.gov/cas/techalerts/TA08-319A.html US Government Resource Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:235 Third Party Advisory
http://secunia.com/advisories/32845 Third Party Advisory
http://www.debian.org/security/2008/dsa-1669 Third Party Advisory
http://secunia.com/advisories/32694 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0978.html Third Party Advisory
http://secunia.com/advisories/32715 Third Party Advisory
http://secunia.com/advisories/32695 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0977.html Third Party Advisory
http://secunia.com/advisories/32714 Third Party Advisory
http://secunia.com/advisories/32693 Third Party Advisory
http://www.debian.org/security/2008/dsa-1671 Third Party Advisory
http://secunia.com/advisories/33433 Third Party Advisory
http://www.debian.org/security/2009/dsa-1697 Third Party Advisory
http://www.debian.org/security/2009/dsa-1696 Third Party Advisory
http://secunia.com/advisories/33434 Third Party Advisory
http://secunia.com/advisories/34501 Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 Broken Link
http://www.vupen.com/english/advisories/2009/0977 Third Party Advisory
http://www.securitytracker.com/id?1021188 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2008/3146 Third Party Advisory
http://secunia.com/advisories/32798 Third Party Advisory
http://secunia.com/advisories/32684 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2008:230 Third Party Advisory
http://secunia.com/advisories/32713 Third Party Advisory
http://ubuntu.com/usn/usn-667-1 Third Party Advisory
http://secunia.com/advisories/32853 Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0976.html Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html Third Party Advisory
http://secunia.com/advisories/32778 Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11186 Third Party Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 17:53:58 Added to TrackCVE