CVE-2012-0455

Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict drag-and-drop operations on javascript: URLs, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web page, related to a "DragAndDropJacking" issue.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00015.html
http://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-0387.html
http://rhn.redhat.com/errata/RHSA-2012-0388.html
http://secunia.com/advisories/48359
http://secunia.com/advisories/48402
http://secunia.com/advisories/48414
http://secunia.com/advisories/48495 Third Party Advisory
http://secunia.com/advisories/48496 Third Party Advisory
http://secunia.com/advisories/48513 Third Party Advisory
http://secunia.com/advisories/48553 Third Party Advisory
http://secunia.com/advisories/48561 Third Party Advisory
http://secunia.com/advisories/48624 Third Party Advisory
http://secunia.com/advisories/48629 Third Party Advisory
http://secunia.com/advisories/48823 Third Party Advisory
http://secunia.com/advisories/48920 Third Party Advisory
http://www.debian.org/security/2012/dsa-2433 Third Party Advisory
http://www.debian.org/security/2012/dsa-2458
http://www.mandriva.com/security/advisories?name=MDVSA-2012:031
http://www.mandriva.com/security/advisories?name=MDVSA-2012:032
http://www.mozilla.org/security/announce/2012/mfsa2012-13.html Vendor Advisory
http://www.securityfocus.com/bid/52458
http://www.securitytracker.com/id?1026801
http://www.securitytracker.com/id?1026803
http://www.securitytracker.com/id?1026804
http://www.ubuntu.com/usn/USN-1400-1
http://www.ubuntu.com/usn/USN-1400-2 Third Party Advisory
http://www.ubuntu.com/usn/USN-1400-3 Third Party Advisory
http://www.ubuntu.com/usn/USN-1400-4 Third Party Advisory
http://www.ubuntu.com/usn/USN-1400-5 Third Party Advisory
http://www.ubuntu.com/usn/USN-1401-1 Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=704354 Issue Tracking Third Party Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14829 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:10.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:10.2:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:9.0.1:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*

Configuration 7 (hide)

cpe:2.3:a:mozilla:seamonkey:*:beta5:*:*:*:*:*:*

History

No history.

Information

Published : 2012-03-14 19:55

Updated : 2023-12-10 11:03


NVD link : CVE-2012-0455

Mitre link : CVE-2012-0455

CVE.ORG link : CVE-2012-0455


JSON object : View

Products Affected

mozilla

  • firefox
  • firefox_esr
  • thunderbird
  • thunderbird_esr
  • seamonkey
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')