Lucene search

K
mozillaMozilla FoundationMFSA2015-148
HistoryDec 15, 2015 - 12:00 a.m.

Privilege escalation vulnerabilities in WebExtension APIs — Mozilla

2015-12-1500:00:00
Mozilla Foundation
www.mozilla.org
19

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

71.4%

Mozilla developer Kris Maglione reported a mechanism where WebExtension APIs could be used to escalate privilege. This could allow arbitrary web content to execute code with the privileges of a particular WebExtension when using these API calls. Depending on the privileges of the extension used, this could result in personal information theft and cross-site scripting (XSS) attacks, including theft of browser cookies. This is mitigated by the requirement to have a WebExtension installed that is vulnerable to this issue.

Affected configurations

Vulners
Node
mozillafirefoxRange<43
CPENameOperatorVersion
firefoxlt43

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:P/A:N

0.003 Low

EPSS

Percentile

71.4%