Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-34471
HistoryJul 05, 2022 - 12:00 a.m.

CVE-2022-34471

2022-07-0500:00:00
ubuntu.com
ubuntu.com
19
add-on update
version verification
downgrade attack
firefox < 102
manifest tampering
server vulnerability

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

34.6%

When downloading an update for an addon, the downloaded addon update’s
version was not verified to match the version selected from the manifest.
If the manifest had been tampered with on the server, an attacker could
trick the browser into downgrading the addon to a prior version. This
vulnerability affects Firefox < 102.

Notes

Author Note
mdeslaur starting with Ubuntu 22.04, the firefox package is just a script that installs the Firefox snap
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchfirefox< 102.0+build2-0ubuntu0.18.04.1UNKNOWN
ubuntu20.04noarchfirefox< 102.0+build2-0ubuntu0.20.04.1UNKNOWN
ubuntu21.10noarchfirefox< 102.0+build2-0ubuntu0.21.10.1UNKNOWN

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

EPSS

0.001

Percentile

34.6%