⚠ Exploited in the wild
Exploitation observed in the wild. Not yet on CISA KEV.
CVE-2022-1529 — Prototype Pollution in Mozilla Firefox
Severity
8.8HIGHNVD
EPSS
4.3%
top 11.12%
CISA KEV
Not in KEV
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedDec 22
Description
An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages8 packages
🔴Vulnerability Details
4GHSA▶
GHSA-grr5-5v7v-g4c4: An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototyp↗2022-12-22
OSV▶
CVE-2022-1529: An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototyp↗2022-12-22
CVEList▶
CVE-2022-1529: An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototyp↗2022-12-22
VulnCheck▶
Mozilla Firefox Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')↗2022