Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-25729

Опубликовано: 14 фев. 2023
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

Permission prompts for opening external schemes were only shown for ContentPrincipals resulting in extensions being able to open them without user interaction via ExpandedPrincipals. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.

The Mozilla Foundation Security Advisory describes this flaw as: Permission prompts for opening external schemes were only shown for ContentPrincipals resulting in extensions being able to open them without user interaction via ExpandedPrincipals. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system.

Отчет

Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxOut of support scope
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7firefoxFixedRHSA-2023:081220.02.2023
Red Hat Enterprise Linux 7thunderbirdFixedRHSA-2023:081720.02.2023
Red Hat Enterprise Linux 8firefoxFixedRHSA-2023:080820.02.2023
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2023:082120.02.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsfirefoxFixedRHSA-2023:080620.02.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsthunderbirdFixedRHSA-2023:081820.02.2023
Red Hat Enterprise Linux 8.2 Advanced Update SupportfirefoxFixedRHSA-2023:081120.02.2023
Red Hat Enterprise Linux 8.2 Advanced Update SupportthunderbirdFixedRHSA-2023:081920.02.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-84
https://bugzilla.redhat.com/show_bug.cgi?id=2170382Mozilla: Extensions could have opened external schemes without user knowledge

EPSS

Процентиль: 31%
0.00116
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 2 лет назад

Permission prompts for opening external schemes were only shown for <code>ContentPrincipals</code> resulting in extensions being able to open them without user interaction via <code>ExpandedPrincipals</code>. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.

CVSS3: 8.8
nvd
около 2 лет назад

Permission prompts for opening external schemes were only shown for <code>ContentPrincipals</code> resulting in extensions being able to open them without user interaction via <code>ExpandedPrincipals</code>. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.

CVSS3: 8.8
debian
около 2 лет назад

Permission prompts for opening external schemes were only shown for <c ...

CVSS3: 8.8
github
около 2 лет назад

Permission prompts for opening external schemes were only shown for <code>ContentPrincipals</code> resulting in extensions being able to open them without user interaction via <code>ExpandedPrincipals</code>. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.

CVSS3: 7.5
fstec
больше 2 лет назад

Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с неправильной нейтрализаций закодированных схем URI на веб-странице, позволяющая нарушителю загрузить файлы или взаимодействовать с программным обеспечением, уже установленным в системе

EPSS

Процентиль: 31%
0.00116
Низкий

8.8 High

CVSS3