Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-12383

Опубликовано: 05 сент. 2018
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox < 62, Firefox ESR < 60.2.1, and Thunderbird < 60.2.1.

Отчет

Upstream decided to not fix this issue in Firefox ESR 60.2 given the low impact. A future ESR update may correct this flaw. This flaw would impact users who had saved passwords from Firefox 58 or earlier that were not protected by a master password (resulting in an un-encrypted key3.db), but set a master password when using Firefox 59 or newer (resulting in an encrypted key4.db). The old key file was kept around to facilitate downgrading to Firefox 58. This flaw cannot be exploited through email in Thunderbird as scripting is disabled in this for email content. It may be possible to exploit through Feeds (Atom or RSS) or other browser-like contexts.

Меры по смягчению последствий

To mitigate against this flaw, examine user profile directories for the presence of both key3.db and key4.db files. If both are present, key3.db should be deleted.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8firefoxNot affected
Red Hat Enterprise Linux 8thunderbirdWill not fix
Red Hat Enterprise Linux 6firefoxFixedRHSA-2018:283427.09.2018
Red Hat Enterprise Linux 6thunderbirdFixedRHSA-2018:340330.10.2018
Red Hat Enterprise Linux 7firefoxFixedRHSA-2018:283527.09.2018
Red Hat Enterprise Linux 7thunderbirdFixedRHSA-2018:345805.11.2018

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-212
https://bugzilla.redhat.com/show_bug.cgi?id=1625531Mozilla: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords

EPSS

Процентиль: 22%
0.00071
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
почти 7 лет назад

If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox < 62, Firefox ESR < 60.2.1, and Thunderbird < 60.2.1.

CVSS3: 5.5
nvd
почти 7 лет назад

If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox < 62, Firefox ESR < 60.2.1, and Thunderbird < 60.2.1.

CVSS3: 5.5
debian
почти 7 лет назад

If a user saved passwords before Firefox 58 and then later set a maste ...

CVSS3: 5.5
github
около 3 лет назад

If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox < 62, Firefox ESR < 60.2.1, and Thunderbird < 60.2.1.

CVSS3: 5.5
fstec
почти 7 лет назад

Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с хранением паролей в незашифрованном виде, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 22%
0.00071
Низкий

5.5 Medium

CVSS3