Lucene search

K
mozillaMozilla FoundationMFSA2015-32
HistoryMar 31, 2015 - 12:00 a.m.

Add-on lightweight theme installation approval bypassed through MITM attack — Mozilla

2015-03-3100:00:00
Mozilla Foundation
www.mozilla.org
20

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

58.7%

Security researcher Armin Ebert discovered that a man-in-the-middle (MITM) attacker spoofing a Mozilla sub-domain could bypass user approval messages to install a Firefox lightweight theme. This was possible because add-on installations of the lightweight themes do not require the use of HTTP over SSL. Firefox extensions were not directly affected and still required user approval for installation.

Affected configurations

Vulners
Node
mozillafirefoxRange<37
CPENameOperatorVersion
firefoxlt37

4.3 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.002 Low

EPSS

Percentile

58.7%