Lucene search

K
mozillaMozilla FoundationMFSA2015-13
HistoryFeb 24, 2015 - 12:00 a.m.

Appended period to hostnames can bypass HPKP and HSTS protections — Mozilla

2015-02-2400:00:00
Mozilla Foundation
www.mozilla.org
27

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

58.9%

Security researcher Muneaki Nishimura reported that when certificate pinning is set to “strict” mode, a period (‘.’) appended to a hostname in the address of a site allowed the bypass key pinning (HPKP) and HTTP Strict Transport Security (HSTS). Sites with a period appended were treated as having a different origin than sites without the period. If an attacker had a security certificate for a domain with the added period, this would allow for a Man-in-the-middle (MITM) attack on users.

Affected configurations

Vulners
Node
mozillafirefoxRange<36
OR
mozillafirefox_osRange<2.2
OR
mozillaseamonkeyRange<2.33
CPENameOperatorVersion
firefoxlt36
firefox oslt2.2
seamonkeylt2.33

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

58.9%