CVE-2009-2472

N/A Unknown
Published: July 22, 2009 Modified: April 23, 2026
View on NVD

Description

Mozilla Firefox before 3.0.12 does not always use XPCCrossOriginWrapper when required during object construction, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted document, related to a "cross origin wrapper bypass."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1162.html
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/35914
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/35944
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/36005
Source: secalert@redhat.com
Third Party Advisory
http://secunia.com/advisories/36145
Source: secalert@redhat.com
Third Party Advisory
http://www.mozilla.org/security/announce/2009/mfsa2009-40.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.securityfocus.com/bid/35758
Source: secalert@redhat.com
Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/1972
Source: secalert@redhat.com
Patch Third Party Advisory
http://www.vupen.com/english/advisories/2009/2152
Source: secalert@redhat.com
Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=479288
Source: secalert@redhat.com
Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=481434
Source: secalert@redhat.com
Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=497102
Source: secalert@redhat.com
Issue Tracking Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2009-1162.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/35914
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/35944
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/36005
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://secunia.com/advisories/36145
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://sunsolve.sun.com/search/document.do?assetkey=1-26-265068-1
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020800.1-1
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mozilla.org/security/announce/2009/mfsa2009-40.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.securityfocus.com/bid/35758
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/1972
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Third Party Advisory
http://www.vupen.com/english/advisories/2009/2152
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=479288
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=481434
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=497102
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Patch Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9497
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01032.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

36 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.7%
72th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

suse fedoraproject opensuse mozilla