Vulnerability identifier: #VU10199
Vulnerability risk: Low
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Mozilla Firefox
Client/Desktop applications /
Web browsers
Vendor: Mozilla
Description
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to the failure to enforce the requirement of the browser.identity.launchWebAuthFlow function of WebExtensions is only allowed to load content over https:.. A remote attacker can bypass security restrictions and load privileges pages.
Mitigation
Update to version 58.0.
Vulnerable software versions
Mozilla Firefox: 57.0 - 57.0.4
External links
https://www.mozilla.org/en-US/security/advisories/mfsa2018-02/
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.