National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2012-0455 Detail

Current Description

Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict drag-and-drop operations on javascript: URLs, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web page, related to a "DragAndDropJacking" issue.

Source:  MITRE      Last Modified:  03/14/2012      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2012-0455
Original release date:
03/14/2012
Last revised:
01/17/2018
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
4.3 MEDIUM
Vector:
(AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
8.6
CVSS Version 2 Metrics:
Access Vector:
Network exploitable - Victim must voluntarily interact with attack mechanism
Access Complexity:
Medium
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized modification

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00014.html External Source SUSE SUSE-SU-2012:0424
http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00015.html External Source SUSE SUSE-SU-2012:0425
http://lists.opensuse.org/opensuse-updates/2012-03/msg00042.html Mailing List; Third Party Advisory External Source SUSE openSUSE-SU-2012:0417
http://rhn.redhat.com/errata/RHSA-2012-0387.html External Source REDHAT RHSA-2012:0387
http://rhn.redhat.com/errata/RHSA-2012-0388.html External Source REDHAT RHSA-2012:0388
http://secunia.com/advisories/48359 External Source SECUNIA 48359
http://secunia.com/advisories/48402 External Source SECUNIA 48402
http://secunia.com/advisories/48414 External Source SECUNIA 48414
http://www.debian.org/security/2012/dsa-2433 Third Party Advisory External Source DEBIAN DSA-2433
http://www.debian.org/security/2012/dsa-2458 External Source DEBIAN DSA-2458
http://www.mandriva.com/security/advisories?name=MDVSA-2012:031 External Source MANDRIVA MDVSA-2012:031
http://www.mandriva.com/security/advisories?name=MDVSA-2012:032 External Source MANDRIVA MDVSA-2012:032
http://www.mozilla.org/security/announce/2012/mfsa2012-13.html Vendor Advisory External Source CONFIRM http://www.mozilla.org/security/announce/2012/mfsa2012-13.html
http://www.securityfocus.com/bid/52458 External Source BID 52458
http://www.securitytracker.com/id?1026801 External Source SECTRACK 1026801
http://www.securitytracker.com/id?1026803 External Source SECTRACK 1026803
http://www.securitytracker.com/id?1026804 External Source SECTRACK 1026804
http://www.ubuntu.com/usn/USN-1400-1 External Source UBUNTU USN-1400-1
http://www.ubuntu.com/usn/USN-1400-2 Third Party Advisory External Source UBUNTU USN-1400-2
http://www.ubuntu.com/usn/USN-1400-3 Third Party Advisory External Source UBUNTU USN-1400-3
http://www.ubuntu.com/usn/USN-1400-4 Third Party Advisory External Source UBUNTU USN-1400-4
http://www.ubuntu.com/usn/USN-1400-5 Third Party Advisory External Source UBUNTU USN-1400-5
http://www.ubuntu.com/usn/USN-1401-1 Third Party Advisory External Source UBUNTU USN-1401-1
https://bugzilla.mozilla.org/show_bug.cgi?id=704354 Issue Tracking; Third Party Advisory External Source CONFIRM https://bugzilla.mozilla.org/show_bug.cgi?id=704354
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14829 Third Party Advisory External Source OVAL oval:org.mitre.oval:def:14829

Technical Details

Vulnerability Type (View All)

  • Cross-Site Scripting (XSS) (CWE-79)

Vulnerable software and versions Switch to CPE 2.2

Configuration 1
OR
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*    versions up to (including) 3.6.27
Configuration 2
OR
cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:5.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:6.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:7.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:8.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:8.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:9.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:9.0.1:*:*:*:*:*:*:*
Configuration 3
OR
cpe:2.3:a:mozilla:firefox_esr:10.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:10.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:10.2:*:*:*:*:*:*:*
Configuration 4
OR
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*    versions up to (including) 3.1.19
Configuration 5
OR
cpe:2.3:a:mozilla:thunderbird:5.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:6.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:8.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:9.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:9.0.1:*:*:*:*:*:*:*
Configuration 6
OR
cpe:2.3:a:mozilla:thunderbird_esr:10.0:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird_esr:10.0.1:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird_esr:10.0.2:*:*:*:*:*:*:*
Configuration 7
OR
cpe:2.3:a:mozilla:seamonkey:*:beta5:*:*:*:*:*:*    versions up to (including) 2.7

Denotes Vulnerable Software
Are we missing a CPE here? Please let us know.

Change History 10 change records found - show changes