Lucene search

K
zdiMariusz MlynskiZDI-15-110
HistoryApr 03, 2015 - 12:00 a.m.

(Pwn2Own) Mozilla Firefox resource: URL Remote Code Execution Vulnerability

2015-04-0300:00:00
Mariusz Mlynski
www.zerodayinitiative.com
15

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.961 High

EPSS

Percentile

99.5%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of documents loaded through the resource: URL. As the same flag was used for chrome: and resource: URLs, these pages were able to subsequently load privileged chrome pages. By combining this with a same-origin policy bypass, an attacker could execute arbitrary code in the context of the current user.

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.961 High

EPSS

Percentile

99.5%