Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310826789
HistoryJan 18, 2023 - 12:00 a.m.

Mozilla Firefox Security Advisories (MFSA2022-54, MFSA2023-02) - Windows

2023-01-1800:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
7
multiple vulnerabilities
logic bug
malicious command
content security policy
memory safety bugs
arbitrary code execution
denial of service
sensitive information disclosure
spoofing attack
upgrade required
mozilla firefox version 109
windows.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.1%

Mozilla Firefox is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:mozilla:firefox";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.826789");
  script_version("2024-02-15T05:05:40+0000");
  script_cve_id("CVE-2023-23597", "CVE-2023-23598", "CVE-2023-23599", "CVE-2023-23601",
                "CVE-2023-23602", "CVE-2023-23603", "CVE-2023-23604", "CVE-2023-23605",
                "CVE-2023-23606");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-02-15 05:05:40 +0000 (Thu, 15 Feb 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-06-08 13:51:00 +0000 (Thu, 08 Jun 2023)");
  script_tag(name:"creation_date", value:"2023-01-18 13:22:42 +0530 (Wed, 18 Jan 2023)");
  script_name("Mozilla Firefox Security Advisories (MFSA2022-54, MFSA2023-02) - Windows");

  script_tag(name:"summary", value:"Mozilla Firefox is prone to multiple vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
  on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to,

  - Logic bug in process allocation allowed to read arbitrary files.

  - Malicious command could be hidden in devtools output on Windows.

  - URL being dragged from cross-origin iframe into same tab triggers navigation.

  - Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers.

  - Calls to <code>console.log</code> allowed bypassing Content Security Policy via
    format directive.

  - Creation of duplicate <code>SystemPrincipal</code> from less secure contexts.

  - Memory safety bugs.");

  script_tag(name:"impact", value:"Successful exploitation will allow
  attackers to execute arbitrary code, cause denial of service, disclose
  sensitive information and conduct spoofing attack.");

  script_tag(name:"affected", value:"Mozilla Firefox version before
  109 on Windows.");

  script_tag(name:"solution", value:"Upgrade to Mozilla Firefox version 109
  or later, Please see the references for more information.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"registry");
  script_xref(name:"URL", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("General");
  script_dependencies("gb_firefox_detect_win.nasl");
  script_mandatory_keys("Firefox/Win/Ver");
  exit(0);
}
include("host_details.inc");
include("version_func.inc");

if( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );
vers = infos['version'];
path = infos['location'];

if(version_is_less(version:vers, test_version:"109"))
{
  report = report_fixed_ver(installed_version:vers, fixed_version:"109", install_path:path);
  security_message(data:report);
  exit(0);
}
exit(0);

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

59.1%