Lucene search

K
mozillaMozilla FoundationMFSA2020-48
HistoryNov 04, 2020 - 12:00 a.m.

OAuth session fixation vulnerability in Mozilla VPN — Mozilla

2020-11-0400:00:00
Mozilla Foundation
www.mozilla.org
13

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

0.001 Low

EPSS

Percentile

44.9%

An OAuth session fixation vulnerability existed in the VPN login flow, where an attacker could craft a custom login URL, convince a VPN user to login via that URL, and obtain authenticated access as that user. This issue is limited to cases where attacker and victim are sharing the same source IP and could allow the ability to view session states and disconnect VPN sessions.

Affected configurations

Vulners
Node
mozillavpnRange<1.1.0android
OR
mozillamozilla_vpnRange<1.0.7
OR
mozillavpnRange<1.2.2windows

7.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

0.001 Low

EPSS

Percentile

44.9%

Related for MFSA2020-48