Description
A malicious extension could have called browser.identity.launchWebAuthFlow, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Affected Packages5 packages
🔴Vulnerability Details
3GHSAGHSA-cm6f-xjjv-f446: A malicious extension could have called browser↗2022-05-24 ▶ OSVCVE-2020-6823: A malicious extension could have called browser↗2020-04-07 ▶ OSVfirefox vulnerabilities↗2020-04-07 ▶ 📋Vendor Advisories
4Red HatMozilla: Malicious Extension could obtain auth codes from OAuth login flows↗2020-04-10 ▶ UbuntuFirefox vulnerabilities↗2020-04-07 ▶ DebianCVE-2020-6823: firefox - A malicious extension could have called <code>browser.identity.launchWebAuthFlow...↗2020 ▶ MozillaMozilla Foundation Security Advisory 2020-12: CVE-2020-6823↗ ▶ 💬Community
1BugzillaCVE-2020-6823 Mozilla: Malicious Extension could obtain auth codes from OAuth login flows↗2020-04-07 ▶