CVE-2018-5152

WebExtensions with the appropriate permissions can attach content scripts to Mozilla sites such as accounts.firefox.com and listen to network traffic to the site through the "webRequest" API. For example, this allows for the interception of username and an encrypted password during login to Firefox Accounts. This issue does not expose synchronization traffic directly and is limited to the process of user login to the website and the data displayed to the user once logged in. This vulnerability affects Firefox < 60.
References
Link Resource
http://www.securityfocus.com/bid/104139 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040896 Third Party Advisory VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=1415644 Issue Tracking Patch Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1427289 Issue Tracking Permissions Required Third Party Advisory
https://usn.ubuntu.com/3645-1/ Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2018-11/ Vendor Advisory
http://www.securityfocus.com/bid/104139 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040896 Third Party Advisory VDB Entry
https://bugzilla.mozilla.org/show_bug.cgi?id=1415644 Issue Tracking Patch Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1427289 Issue Tracking Permissions Required Third Party Advisory
https://usn.ubuntu.com/3645-1/ Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2018-11/ Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

History

21 Nov 2024, 04:08

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/104139 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/104139 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040896 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040896 - Third Party Advisory, VDB Entry
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1415644 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=1415644 - Issue Tracking, Patch, Third Party Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1427289 - Issue Tracking, Permissions Required, Third Party Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=1427289 - Issue Tracking, Permissions Required, Third Party Advisory
References () https://usn.ubuntu.com/3645-1/ - Third Party Advisory () https://usn.ubuntu.com/3645-1/ - Third Party Advisory
References () https://www.mozilla.org/security/advisories/mfsa2018-11/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2018-11/ - Vendor Advisory

Information

Published : 2018-06-11 21:29

Updated : 2024-11-21 04:08


NVD link : CVE-2018-5152

Mitre link : CVE-2018-5152

CVE.ORG link : CVE-2018-5152


JSON object : View

Products Affected

mozilla

  • firefox

canonical

  • ubuntu_linux
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm