Уязвимость выполнения произвольных команд через некорректную обработку HTTP-метода в функции "Copy as cURL" в Mozilla Firefox и Thunderbird на Windows
Описание
Функция Copy as cURL в сетевой вкладке Devtools в Mozilla Firefox некорректно экранирует HTTP-метод запроса, который может контролироваться веб-сайтом. Если пользователь использует функцию Copy as cURL и вставляет команду в терминал, это приводит к внедрению выполнению произвольных команд.
Примечание: данная проблема затрагивает только Firefox на операционных системах Windows.
Затронутые версии ПО
- Firefox ESR версий до 68.8
- Firefox версий до 76
- Thunderbird версий до 68.8.0
Тип уязвимости
Внедрение и выполнение произвольных команд
Ссылки
- Permissions Required
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Permissions Required
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Одновременно
Одно из
EPSS
7.8 High
CVSS3
4.6 Medium
CVSS2
Дефекты
Связанные уязвимости
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
The 'Copy as cURL' feature of Devtools' network tab did not properly e ...
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
EPSS
7.8 High
CVSS3
4.6 Medium
CVSS2