// For flags

CVE-2013-1687

Mozilla: Privileged content access and execution via XBL (MFSA 2013-51)

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The System Only Wrapper (SOW) and Chrome Object Wrapper (COW) implementations in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly restrict XBL user-defined functions, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges, or conduct cross-site scripting (XSS) attacks, via a crafted web site.

Las implementaciones System Only Wrapper (SOW) y Chrome Object Wrapper (COW) en Mozilla Firefox anterior a v22.0, Firefox ESR v17.x anterior a v17.0.7, Thunderbird anterior a v17.0.7, y Thunderbird ESR v17.x anterior a v17.0.7 no restringen adecuadamente las funciones XBL definidas por el usuario lo que permite a atacantes remotos ejecutar código JavaScript con privilegios de chrome, o llevar a cabo ataques de ejecución de secuencias de comandos en sitios cruzados (XSS) a través de un sitios web manipulado.

Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Security researcher Abhishek Arya of the Google Chrome Security Team used the Address Sanitizer tool to discover a series of use-after-free problems rated critical as security issues in shipped software. Some of these issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting additional use-after-free and buffer overflow flaws in code introduced during Firefox development. These were fixed before general release. Various other security issues were also addressed. The mozilla firefox packages have been upgraded to the latest ESR version which is unaffected by these security flaws.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-02-13 CVE Reserved
  • 2013-06-25 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 21.0
Search vendor "Mozilla" for product "Firefox" and version " <= 21.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
19.0
Search vendor "Mozilla" for product "Firefox" and version "19.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
19.0.1
Search vendor "Mozilla" for product "Firefox" and version "19.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
19.0.2
Search vendor "Mozilla" for product "Firefox" and version "19.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
20.0
Search vendor "Mozilla" for product "Firefox" and version "20.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
20.0.1
Search vendor "Mozilla" for product "Firefox" and version "20.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0.1
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0.2
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0.3
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0.3"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0.4
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0.4"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0.5
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0.6
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0.6"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
<= 17.0.6
Search vendor "Mozilla" for product "Thunderbird" and version " <= 17.0.6"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
17.0
Search vendor "Mozilla" for product "Thunderbird" and version "17.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
17.0.1
Search vendor "Mozilla" for product "Thunderbird" and version "17.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
17.0.2
Search vendor "Mozilla" for product "Thunderbird" and version "17.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
17.0.3
Search vendor "Mozilla" for product "Thunderbird" and version "17.0.3"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
17.0.4
Search vendor "Mozilla" for product "Thunderbird" and version "17.0.4"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
17.0.5
Search vendor "Mozilla" for product "Thunderbird" and version "17.0.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0.1
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0.2
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0.3
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0.3"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0.4
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0.4"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0.5
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0.6
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0.6"
-
Affected