Mozilla Firefox for Android < 42.0 Multiple Vulnerabilities
Medium Nessus Network Monitor Plugin ID 9019
The remote host has a web browser installed that is vulnerable to multiple attack vectors.
Versions of Mozilla Firefox for Android earlier than 42.0 are affected by multiple vulnerabilities. These include : - A flaw exists in 'mobile/android/chrome/content/browser.js' that is triggered when the device exits fullscreen mode. This allows a context-dependent attacker to spoof the address bar. (CVE-2015-7185) - A flaw exists in 'mobile/android/components/HelperAppDialog.js' that is triggered when handling the 'file://' URI scheme. This may allow a context-dependent attacker to download arbitrary files or open cached profile data without the user knowing. (CVE-2015-7186) - A flaw exists in 'mobile/android/search/java/org/mozilla/search/PostSearchFragment.java' related to the crash reporter. The issue is triggered when a registered search engine uses an Android intent to launch the program. This may allow a malicious app to gain access to local log files that may contain sensitive information or local HTML files through file: URIs. (CVE-2015-7190) - A flaw exists in the 'IntentHelper::openNoHandler()' function in 'mobile/android/base/IntentHelper.java.' The issue is triggered when handling 'intent://' URLs during Fallback navigation. This may allow a context-dependent attacker to execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server (i.e. conduct UXSS attacks). (CVE-2015-7191)
Upgrade to Mozilla Firefox 42.0 or later from the Google Play app store.