8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
43.8%
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. (CVE-2023-37201,
CVE-2023-37202, CVE-2023-37205, CVE-2023-37207, CVE-2023-37209,
CVE-2023-37210, CVE-2023-37211, CVE-2023-37212)
Martin Hostettler discovered that Firefox did not properly block storage of
all cookies when configured. An attacker could potentially exploits this
issue to store tracking data without permission in localstorage.
(CVE-2023-3482)
Paul Nickerson discovered that Firefox did have insufficient validation in
the Drag and Drop API. If a user were tricked into creating a shortcut to
local system files, an attacker could execute arbitrary code.
(CVE-2023-37203)
Irvan Kurniawan discovered that Firefox did not properly manage fullscreen
notifications using an option element having an expensive computational
function. An attacker could potentially exploit this issue to perform
spoofing attacks. (CVE-2023-37204)
Ameen Basha M K discovered that Firefox did not properly validate symlinks
in the FileSystem API. If a user were tricked into uploading a symlinked
file to a malicious website, an attacker could obtain sensitive information.
(CVE-2023-37206)
Puf discovered that Firefox did not properly provide warning when opening
Diagcab files. If a user were tricked into opening a malicicous Diagcab
file, an attacker could execute arbitrary code. (CVE-2023-37208)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.04 | noarch | firefox | < 115.0+build2-0ubuntu0.20.04.3 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-dbg | < 115.0+build2-0ubuntu0.20.04.3 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-dev | < 115.0+build2-0ubuntu0.20.04.3 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-geckodriver | < 115.0+build2-0ubuntu0.20.04.3 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-af | < 115.0+build2-0ubuntu0.20.04.3 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-an | < 115.0+build2-0ubuntu0.20.04.3 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-ar | < 115.0+build2-0ubuntu0.20.04.3 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-as | < 115.0+build2-0ubuntu0.20.04.3 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-ast | < 115.0+build2-0ubuntu0.20.04.3 | UNKNOWN |
Ubuntu | 20.04 | noarch | firefox-locale-az | < 115.0+build2-0ubuntu0.20.04.3 | UNKNOWN |
ubuntu.com/security/CVE-2023-3482
ubuntu.com/security/CVE-2023-37201
ubuntu.com/security/CVE-2023-37202
ubuntu.com/security/CVE-2023-37203
ubuntu.com/security/CVE-2023-37204
ubuntu.com/security/CVE-2023-37205
ubuntu.com/security/CVE-2023-37206
ubuntu.com/security/CVE-2023-37207
ubuntu.com/security/CVE-2023-37208
ubuntu.com/security/CVE-2023-37209
ubuntu.com/security/CVE-2023-37210
ubuntu.com/security/CVE-2023-37211
ubuntu.com/security/CVE-2023-37212
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
43.8%