CVE-2018-12399Improper Authentication in Mozilla Firefox

Severity
4.3MEDIUMNVD
OSV8.8
EPSS
0.4%
top 38.83%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 28
Latest updateMay 14

Description

When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages4 packages

debiandebian/firefox< firefox 63.0-1 (sid)
CVEListV5mozilla/firefoxunspecified63
NVDmozilla/firefox< 63.0
Ubuntumozilla/firefox< 63.0.3+build1-0ubuntu0.14.04.1+5

Also affects: Ubuntu Linux 14.04, 16.04, 18.04, 18.10

🔴Vulnerability Details

4
GHSA
GHSA-rw88-vh2c-q47r: When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the n2022-05-14
OSV
firefox regressions2018-11-23
OSV
firefox vulnerabilities2018-10-24
OSV
CVE-2018-12399: When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the n2018-10-24

📋Vendor Advisories

4
Ubuntu
Firefox regressions2018-11-23
Ubuntu
Firefox vulnerabilities2018-10-24
Red Hat
firefox: Spoofing of protocol registration notification bar2018-10-23
Debian
CVE-2018-12399: firefox - When a new protocol handler is registered, the API accepts a title argument whic...2018

💬Community

1
Bugzilla
CVE-2018-12399 firefox: Spoofing of protocol registration notification bar2019-03-28