Mozilla Firefox < 50.0.1 Authentication Bypass

low Nessus Network Monitor Plugin ID 9849

Synopsis

The remote host has a web browser installed that is vulnerable to an authentication bypass attack vector.

Description

Versions of Mozilla Firefox prior to 50.0.1 are unpatched for a flaw in the 'nsScriptSecurityManager::GetChannelResultPrincipal()' function in 'caps/nsScriptSecurityManager.cpp' that is triggered when handling HTTP redirects to 'data: URLs'. This may allow a context-dependent attacker to bypass the same-origin policy.

Solution

Upgrade to Firefox version 50.0.1 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2016-91

Plugin Details

Severity: Low

ID: 9849

Family: Web Clients

Published: 1/5/2017

Updated: 3/6/2019

Nessus ID: 95436, 95437

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Patch Publication Date: 11/28/2016

Vulnerability Publication Date: 11/24/2016

Reference Information

CVE: CVE-2016-9078

BID: 94569