Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310832076
HistoryMay 11, 2023 - 12:00 a.m.

Mozilla Firefox Security Advisories (MFSA2023-16, MFSA2023-17) - Windows

2023-05-1100:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
11
mozilla firefox
mfsa2023-16
mfsa2023-17
windows
vulnerabilities
cve-2023-32205
cve-2023-32206
cve-2023-32207
cve-2023-32208
cve-2023-32209
cve-2023-32210
cve-2023-32211
cve-2023-32212
cve-2023-32213
cve-2023-32214
cve-2023-32215
cve-2023-32216
permissions request bypass
clickjacking
dos
script base url
service workers
browser prompts
rlbox expat driver
protocol handlers
arbitrary code
memory corruption
security advisory.

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.3

Confidence

High

EPSS

0.003

Percentile

70.5%

Mozilla Firefox is prone to multiple
vulnerabilities.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:mozilla:firefox";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.832076");
  script_version("2024-02-15T05:05:40+0000");
  script_cve_id("CVE-2023-32205", "CVE-2023-32206", "CVE-2023-32207", "CVE-2023-32208",
                "CVE-2023-32209", "CVE-2023-32210", "CVE-2023-32211", "CVE-2023-32212",
                "CVE-2023-32213", "CVE-2023-32214", "CVE-2023-32215", "CVE-2023-32216");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-02-15 05:05:40 +0000 (Thu, 15 Feb 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-06-27 08:25:00 +0000 (Tue, 27 Jun 2023)");
  script_tag(name:"creation_date", value:"2023-05-11 15:33:42 +0530 (Thu, 11 May 2023)");
  script_name("Mozilla Firefox Security Advisories (MFSA2023-16, MFSA2023-17) - Windows");

  script_tag(name:"summary", value:"Mozilla Firefox is prone to multiple
  vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
  on the target host.");

  script_tag(name:"insight", value:"Multiple flaws exist due to,

  - Browser prompts could have been obscured by popups.

  - Crash in RLBox Expat driver.

  - Potential permissions request bypass via clickjacking.

  - Leak of script base URL in service workers via import().

  - Persistent DoS via favicon image.

  - Incorrect principal object ordering.

  - Content process crash due to invalid wasm code.

  - Potential spoof due to obscured address bar.

  - Potential memory corruption in FileReader::DoReadData().

  - Potential DoS via exposed protocol handlers.");

  script_tag(name:"impact", value:"Successful exploitation allow attackers to
  disclose sensitive information, execute arbitrary code and cause denial of
  service condition.");

  script_tag(name:"affected", value:"Mozilla Firefox version before 113 on Windows.");

  script_tag(name:"solution", value:"Upgrade to Mozilla Firefox version 113
  or later, Please see the references for more information.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"registry");
  script_xref(name:"URL", value:"https://www.mozilla.org/en-US/security/advisories/mfsa2023-16/");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("General");
  script_dependencies("gb_firefox_detect_win.nasl");
  script_mandatory_keys("Firefox/Win/Ver");
  exit(0);
}
include("host_details.inc");
include("version_func.inc");

if( ! infos = get_app_version_and_location( cpe:CPE, exit_no_version:TRUE) ) exit( 0 );
vers = infos['version'];
path = infos['location'];

if(version_is_less(version:vers, test_version:"113"))
{
  report = report_fixed_ver(installed_version:vers, fixed_version:"113", install_path:path);
  security_message(data:report);
  exit(0);
}

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8.3

Confidence

High

EPSS

0.003

Percentile

70.5%