Lucene search

K
mozillaMozilla FoundationMFSA2006-52
HistoryJul 25, 2006 - 12:00 a.m.

PAC privilege escalation using Function.prototype.call — Mozilla

2006-07-2500:00:00
Mozilla Foundation
www.mozilla.org
8

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.097 Low

EPSS

Percentile

94.7%

moz_bug_r_a4 reports that a malicious Proxy AutoConfig (PAC) server could serve a PAC script that can execute code with elevated privileges by setting the required FindProxyForURL function to the eval method on a privileged object that leaked into the PAC sandbox. By redirecting the victim to a specially-crafted URL – easily done since the PAC script controls which proxy to use – the URL “hostname” can be executed as privileged script.

CPENameOperatorVersion
firefoxlt1.5.0.5
seamonkeylt1.0.3

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.097 Low

EPSS

Percentile

94.7%