Lucene search

K
mozillaMozilla FoundationMFSA2013-99
HistoryOct 29, 2013 - 12:00 a.m.

Security bypass of PDF.js checks using iframes — Mozilla

2013-10-2900:00:00
Mozilla Foundation
www.mozilla.org
19

8.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:C/I:P/A:P

0.011 Low

EPSS

Percentile

84.8%

Security researcher Cody Crews discovered a method to append an iframe into an embedded PDF object rendered with the chrome privileged PDF.js. This can used to bypass security restrictions to load local or chrome privileged files and objects within the embedded PDF object. This can lead to information disclosure of local system files.

Affected configurations

Vulners
Node
mozillafirefoxRange<25
OR
mozillafirefox_esrRange<24.1
CPENameOperatorVersion
firefoxlt25
firefox esrlt24.1

8.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:C/I:P/A:P

0.011 Low

EPSS

Percentile

84.8%