Bug 1169211 (CVE-2014-8631, CVE-2014-8632) - CVE-2014-8631 CVE-2014-8632 Mozilla: Privileged access to security wrapped protected objects (MFSA 2014-91)
Summary: CVE-2014-8631 CVE-2014-8632 Mozilla: Privileged access to security wrapped pr...
Alias: CVE-2014-8631, CVE-2014-8632
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On:
Blocks: 1167594
TreeView+ depends on / blocked
Reported: 2014-12-01 04:20 UTC by Huzaifa S. Sidhpurwala
Modified: 2023-05-12 06:24 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2014-12-01 04:24:34 UTC

Attachments (Terms of Use)

Description Huzaifa S. Sidhpurwala 2014-12-01 04:20:23 UTC
Mozilla developer Bobby Holley discovered two issues involving security wrappers.

The first of these issues occurs when XrayWrappers filter object properties. When validation of the object initially occurs, one set of object properties will appear to be available. Later, when the XrayWrappers are removed, a more expansive set of properties is available. These are then stored without further validation, making these properties available and bypassing security protections that would normally protect them from access.

The second issue occurs when chrome objects are protected by Chrome Object Wrappers (COW) and are passed as native interfaces. If this is done with some methods, normally protected objects may be accessible to native methods exposed to web content.

Both of these issues could allow web content to access DOM objects that are intended to be chrome-only. 

External Reference:



Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Bobby Holley  as the original reporter.


This issue does not affect the version of firefox and thunderbird as shipped with Red Hat Enterprise Linux 5, 6 and 7.

Comment 2 Murray McAllister 2014-12-03 04:01:13 UTC
Public now:


Note You need to log in before you can comment on or make changes to this bug.