// For flags

CVE-2013-1697

Mozilla: XrayWrappers can be bypassed to run user defined methods in a privileged context (MFSA 2013-59)

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method.

La implementación XrayWrapper en Mozilla Firefox anterior a v22.0, Firefox ESR v17.x antes de v17.0.7, Thunderbird anterior a v17.0.7 no restringe correctamente el uso de DefaultValue para las llamadas a métodos, lo que permite a atacantes remotos ejecutar código JavaScript con privilegios de chrome a través de sitios web manipulados que dispara el uso de los métodos user-defined (1) toString o (2) valueOf

Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code. Security researcher Abhishek Arya of the Google Chrome Security Team used the Address Sanitizer tool to discover a series of use-after-free problems rated critical as security issues in shipped software. Some of these issues are potentially exploitable, allowing for remote code execution. We would also like to thank Abhishek for reporting additional use-after-free and buffer overflow flaws in code introduced during Firefox development. These were fixed before general release. Various other security issues were also addressed. The mozilla firefox packages have been upgraded to the latest ESR version which is unaffected by these security flaws.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-02-13 CVE Reserved
  • 2013-06-25 CVE Published
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
<= 21.0
Search vendor "Mozilla" for product "Firefox" and version " <= 21.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
19.0
Search vendor "Mozilla" for product "Firefox" and version "19.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
19.0.1
Search vendor "Mozilla" for product "Firefox" and version "19.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
19.0.2
Search vendor "Mozilla" for product "Firefox" and version "19.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
20.0
Search vendor "Mozilla" for product "Firefox" and version "20.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox
Search vendor "Mozilla" for product "Firefox"
20.0.1
Search vendor "Mozilla" for product "Firefox" and version "20.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0.1
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0.2
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0.3
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0.3"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0.4
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0.4"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0.5
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Firefox Esr
Search vendor "Mozilla" for product "Firefox Esr"
17.0.6
Search vendor "Mozilla" for product "Firefox Esr" and version "17.0.6"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
<= 17.0.6
Search vendor "Mozilla" for product "Thunderbird" and version " <= 17.0.6"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
17.0
Search vendor "Mozilla" for product "Thunderbird" and version "17.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
17.0.1
Search vendor "Mozilla" for product "Thunderbird" and version "17.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
17.0.2
Search vendor "Mozilla" for product "Thunderbird" and version "17.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
17.0.3
Search vendor "Mozilla" for product "Thunderbird" and version "17.0.3"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
17.0.4
Search vendor "Mozilla" for product "Thunderbird" and version "17.0.4"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird
Search vendor "Mozilla" for product "Thunderbird"
17.0.5
Search vendor "Mozilla" for product "Thunderbird" and version "17.0.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0.1
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0.1"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0.2
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0.2"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0.3
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0.3"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0.4
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0.4"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0.5
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0.5"
-
Affected
Mozilla
Search vendor "Mozilla"
Thunderbird Esr
Search vendor "Mozilla" for product "Thunderbird Esr"
17.0.6
Search vendor "Mozilla" for product "Thunderbird Esr" and version "17.0.6"
-
Affected