Lucene search

K
nessusThis script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.MOZILLA_FIREFOX_76_0.NASL
HistoryMay 07, 2020 - 12:00 a.m.

Mozilla Firefox < 76.0

2020-05-0700:00:00
This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
25

10 High

AI Score

Confidence

High

The version of Firefox installed on the remote Windows host is prior to 76.0. It is, therefore, affected by multiple vulnerabilities as referenced in the mfsa2020-16 advisory.

  • A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash.
    (CVE-2020-12387)

  • The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape.Note: this issue only affects Firefox on Windows operating systems. (CVE-2020-12388, CVE-2020-12389)

  • A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash.
    (CVE-2020-6831)

  • Incorrect origin serialization of URLs with IPv6 addresses could lead to incorrect security checks (CVE-2020-12390)

  • Documents formed using data: URLs in an object element failed to inherit the CSP of the creating context. This allowed the execution of scripts that should have been blocked, albeit with a unique opaque origin. (CVE-2020-12391)

  • The ‘Copy as cURL’ feature of Devtools’ network tab did not properly escape the HTTP POST data of a request, which can be controlled by the website. If a user used the ‘Copy as cURL’ feature and pasted the command into a terminal, it could have resulted in the disclosure of local files. (CVE-2020-12392)

  • The ‘Copy as cURL’ feature of Devtools’ network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the ‘Copy as cURL’ feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution.Note: this issue only affects Firefox on Windows operating systems.
    (CVE-2020-12393)

  • A logic flaw in our location bar implementation could have allowed a local attacker to spoof the current location by selecting a different origin and removing focus from the input element. (CVE-2020-12394)

  • Mozilla developers and community members Alexandru Michis, Jason Kratzer, philipp, Ted Campbell, Bas Schouten, Andr Bargull, and Karl Tomlinson reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. (CVE-2020-12395)

  • Mozilla developers and community members Frederik Braun, Andrew McCreight, C.M.Chang, and Dan Minor reported memory safety bugs present in Firefox 75. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. (CVE-2020-12396)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#
# (C) Tenable Network Security, Inc.
#


# The descriptive text and package checks in this plugin were
# extracted from Mozilla Foundation Security Advisory mfsa2020-16.
# The text itself is copyright (C) Mozilla Foundation.

include('compat.inc');

if (description)
{
  script_id(136404);
  script_version("1.8");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/13");

  script_cve_id(
    "CVE-2020-6831",
    "CVE-2020-12387",
    "CVE-2020-12388",
    "CVE-2020-12389",
    "CVE-2020-12390",
    "CVE-2020-12391",
    "CVE-2020-12392",
    "CVE-2020-12393",
    "CVE-2020-12394",
    "CVE-2020-12395",
    "CVE-2020-12396"
  );
  script_xref(name:"MFSA", value:"2020-16");
  script_xref(name:"IAVA", value:"2020-A-0190-S");

  script_name(english:"Mozilla Firefox < 76.0");

  script_set_attribute(attribute:"synopsis", value:
"A web browser installed on the remote Windows host is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"The version of Firefox installed on the remote Windows host is prior to 76.0. It is, therefore, affected by multiple
vulnerabilities as referenced in the mfsa2020-16 advisory.

  - A race condition when running shutdown code for Web
    Worker led to a use-after-free vulnerability. This
    resulted in a potentially exploitable crash.
    (CVE-2020-12387)

  - The Firefox content processes did not sufficiently
    lockdown access control which could result in a sandbox
    escape.Note: this issue only affects Firefox on
    Windows operating systems. (CVE-2020-12388,
    CVE-2020-12389)

  - A buffer overflow could occur when parsing and
    validating SCTP chunks in WebRTC. This could have led to
    memory corruption and a potentially exploitable crash.
    (CVE-2020-6831)

  - Incorrect origin serialization of URLs with IPv6
    addresses could lead to incorrect security checks
    (CVE-2020-12390)

  - Documents formed using data: URLs in an
    object element failed to inherit the CSP of
    the creating context. This allowed the execution of
    scripts that should have been blocked, albeit with a
    unique opaque origin. (CVE-2020-12391)

  - The 'Copy as cURL' feature of Devtools' network tab did
    not properly escape the HTTP POST data of a request,
    which can be controlled by the website. If a user used
    the 'Copy as cURL' feature and pasted the command into a
    terminal, it could have resulted in the disclosure of
    local files. (CVE-2020-12392)

  - The 'Copy as cURL' feature of Devtools' network tab did
    not properly escape the HTTP method of a request, which
    can be controlled by the website. If a user used the
    'Copy as cURL' feature and pasted the command into a
    terminal, it could have resulted in command injection
    and arbitrary command execution.Note: this issue
    only affects Firefox on Windows operating systems.
    (CVE-2020-12393)

  - A logic flaw in our location bar implementation could
    have allowed a local attacker to spoof the current
    location by selecting a different origin and removing
    focus from the input element. (CVE-2020-12394)

  - Mozilla developers and community members Alexandru
    Michis, Jason Kratzer, philipp, Ted Campbell, Bas
    Schouten, Andr Bargull, and Karl Tomlinson reported
    memory safety bugs present in Firefox 75 and Firefox ESR
    68.7. Some of these bugs showed evidence of memory
    corruption and we presume that with enough effort some
    of these could have been exploited to run arbitrary
    code. (CVE-2020-12395)

  - Mozilla developers and community members Frederik Braun,
    Andrew McCreight, C.M.Chang, and Dan Minor reported
    memory safety bugs present in Firefox 75. Some of these
    bugs showed evidence of memory corruption and we presume
    that with enough effort some of these could have been
    exploited to run arbitrary code. (CVE-2020-12396)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2020-16/");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Mozilla Firefox version 76.0 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-12395");
  script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2020-12389");

  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2020/05/05");
  script_set_attribute(attribute:"patch_publication_date", value:"2020/05/05");
  script_set_attribute(attribute:"plugin_publication_date", value:"2020/05/07");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:firefox");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("mozilla_org_installed.nasl");
  script_require_keys("Mozilla/Firefox/Version");

  exit(0);
}

include('mozilla_version.inc');

port = get_kb_item("SMB/transport");
if (!port) port = 445;

installs = get_kb_list("SMB/Mozilla/Firefox/*");
if (isnull(installs)) audit(AUDIT_NOT_INST, "Firefox");

mozilla_check_version(installs:installs, product:'firefox', esr:FALSE, fix:'76.0', severity:SECURITY_HOLE);

VendorProductVersion
mozillafirefox

10 High

AI Score

Confidence

High

Related for MOZILLA_FIREFOX_76_0.NASL