Rapid7 Vulnerability & Exploit Database

MFSA2013-94 Firefox: Spoofing addressbar though SELECT element (CVE-2013-5593)

Back to Search

MFSA2013-94 Firefox: Spoofing addressbar though SELECT element (CVE-2013-5593)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
10/29/2013
Created
07/25/2018
Added
10/30/2013
Modified
04/05/2017

Description

The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.

Solution(s)

  • mozilla-firefox-esr-upgrade-24_1
  • mozilla-firefox-upgrade-25_0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;