Vulnerability Name: | CVE-2018-5112 (CCN-138158) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-01-23 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2018-01-23 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2019-10-03 | ||||||||||||||||||||||||||||||||||||||||
Summary: | Development Tools panels of an extension are required to load URLs for the panels as relative URLs from the extension manifest file but this requirement was not enforced in all instances. This could allow the development tools panel for the extension to load a URL that it should not be able to access, including potentially privileged pages. This vulnerability affects Firefox < 58. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-552 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-5112 Source: BID Type: Third Party Advisory, VDB Entry 102786 Source: CCN Type: BID-102786 Mozilla Firefox MFSA2018-02 Multiple Security Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1040270 Source: CONFIRM Type: Issue Tracking, Permissions Required https://bugzilla.mozilla.org/show_bug.cgi?id=1425224 Source: XF Type: UNKNOWN firefox-cve20185112-sec-bypass(138158) Source: UBUNTU Type: Third Party Advisory USN-3544-1 Source: CCN Type: Mozilla Foundation Security Advisory 2018-02 Security vulnerabilities fixed in Firefox 58 Source: CONFIRM Type: Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-02/ | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |