Unrated severityNVD Advisory· Published Nov 21, 2012· Updated Apr 29, 2026
CVE-2012-4205
CVE-2012-4205
Description
Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.
Affected products
17cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_desktop:11:sp2:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*+ 2 more
- cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*
cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp2:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
20- lists.opensuse.org/opensuse-security-announce/2012-11/msg00021.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2013-01/msg00022.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2012-11/msg00090.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2012-11/msg00092.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2012-11/msg00093.htmlnvdMailing ListThird Party Advisory
- www.mozilla.org/security/announce/2012/mfsa2012-97.htmlnvdVendor Advisory
- www.securityfocus.com/bid/56621nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/USN-1636-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1638-1nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1638-2nvdThird Party Advisory
- www.ubuntu.com/usn/USN-1638-3nvdThird Party Advisory
- bugzilla.mozilla.org/show_bug.cginvdIssue TrackingVendor Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/80175nvdThird Party AdvisoryVDB Entry
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16965nvdThird Party Advisory
- secunia.com/advisories/51369nvdBroken Link
- secunia.com/advisories/51370nvdBroken Link
- secunia.com/advisories/51381nvdBroken Link
- secunia.com/advisories/51434nvdBroken Link
- secunia.com/advisories/51439nvdBroken Link
- secunia.com/advisories/51440nvdBroken Link
News mentions
0No linked articles in our index yet.