Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-0237

Опубликовано: 07 янв. 2025
Источник: debian
EPSS Низкий

Описание

The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed134.0-1package
firefox-esrfixed128.6.0esr-1package
thunderbirdfixed1:128.6.0esr-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/#CVE-2025-0237

  • https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/#CVE-2025-0237

  • https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/#CVE-2025-0237

EPSS

Процентиль: 26%
0.00084
Низкий

Связанные уязвимости

CVSS3: 5.4
ubuntu
5 месяцев назад

The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.

CVSS3: 6.8
redhat
5 месяцев назад

The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.

CVSS3: 5.4
nvd
5 месяцев назад

The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.

CVSS3: 5.4
github
5 месяцев назад

The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6.

CVSS3: 6.8
fstec
5 месяцев назад

Уязвимость интерфейса WebChannel API браузеров Mozilla Firefox, Firefox ESR и почтовых клиентов Thunderbird, Thunderbird ESR, позволяющая нарушителю повысить свои привилегии

EPSS

Процентиль: 26%
0.00084
Низкий