| Vulnerability Name: | CVE-2018-5105 (CCN-138150) | ||||||||||||||||||||||||||||||||||||||||
| Assigned: | 2018-01-23 | ||||||||||||||||||||||||||||||||||||||||
| Published: | 2018-01-23 | ||||||||||||||||||||||||||||||||||||||||
| Updated: | 2019-10-03 | ||||||||||||||||||||||||||||||||||||||||
| Summary: | WebExtensions can bypass user prompts to first save and then open an arbitrarily downloaded file. This can result in an executable file running with local user privileges without explicit user consent. This vulnerability affects Firefox < 58. | ||||||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-noinfo | ||||||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-5105 Source: BID Type: Third Party Advisory, VDB Entry 102786 Source: CCN Type: BID-102786 Mozilla Firefox MFSA2018-02 Multiple Security Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1040270 Source: CONFIRM Type: Issue Tracking, Permissions Required https://bugzilla.mozilla.org/show_bug.cgi?id=1390882 Source: XF Type: UNKNOWN firefox-cve20185105-priv-esc(138150) Source: UBUNTU Type: Third Party Advisory USN-3544-1 Source: CCN Type: Mozilla Foundation Security Advisory 2018-02 Security vulnerabilities fixed in Firefox 58 Source: CONFIRM Type: Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-02/ | ||||||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||||||