WebExtensions with the appropriate permissions can attach content scripts to Mozilla sites such as accounts.firefox.com and listen to network traffic to the site through the "webRequest" API. For example, this allows for the interception of username and an encrypted password during login to Firefox Accounts. This issue does not expose synchronization traffic directly and is limited to the process of user login to the website and the data displayed to the user once logged in. This vulnerability affects Firefox < 60.
References
Link | Resource |
---|---|
https://www.mozilla.org/security/advisories/mfsa2018-11/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1427289 | Issue Tracking Permissions Required Third Party Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1415644 | Issue Tracking Patch Third Party Advisory |
https://usn.ubuntu.com/3645-1/ | Third Party Advisory |
http://www.securitytracker.com/id/1040896 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/104139 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2018-06-11 14:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-5152
Mitre link : CVE-2018-5152
JSON object : View
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
Products Affected
mozilla
- firefox
canonical
- ubuntu_linux