Mozilla Firefox < 50.0.1 Authentication Bypass

Medium Nessus Network Monitor Plugin ID 9849

Synopsis

The remote host has a web browser installed that is vulnerable to an authentication bypass attack vector.

Description

Versions of Mozilla Firefox prior to 50.0.1 are unpatched for a flaw in the 'nsScriptSecurityManager::GetChannelResultPrincipal()' function in 'caps/nsScriptSecurityManager.cpp' that is triggered when handling HTTP redirects to 'data: URLs'. This may allow a context-dependent attacker to bypass the same-origin policy.

Solution

Upgrade to Firefox version 50.0.1 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2016-91

Plugin Details

Severity: Medium

ID: 9849

File Name: 9849.prm

Family: Web Clients

Published: 2017/01/05

Modified: 2017/01/05

Dependencies: 9131

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSSv3

Base Score: 3.6

Temporal Score: 3.4

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS3#E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Patch Publication Date: 2016/11/28

Vulnerability Publication Date: 2016/11/24

Reference Information

CVE: CVE-2016-9078

BID: 94569