Permissions, Privileges, and Access Controls in firefox (Alpine package)



Published: 2020-05-05
Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-12388
CWE-ID CWE-264
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Subscribe
firefox (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU27530

Risk: High

CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C]

CVE-ID: CVE-2020-12388

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to bypass sandbox restrictions.

The vulnerability exists due the Firefox content processes did not sufficiently lockdown access control due to improper protection of access tokens. A remote attacker can bypass implemented security restrictions and execute arbitrary code on the target system.

Note, this vulnerability affects Windows versions only.

Mitigation

Install update from vendor's website.

Vulnerable software versions

firefox (Alpine package): 60.0.1-r0 - 75.0-r2

External links

http://git.alpinelinux.org/aports/commit/?id=37e37d549603b29c55fafcde8f3732cfb9db1640
http://git.alpinelinux.org/aports/commit/?id=5d9ca1b5fa041ac0d09e2bd2038f505e06c7d7f5
http://git.alpinelinux.org/aports/commit/?id=397c40a2e03948882e67f7fb7053d46e6dda50d3
http://git.alpinelinux.org/aports/commit/?id=4b76c8208fa0c29e289d14baf509b417f7c96a08
http://git.alpinelinux.org/aports/commit/?id=c9413fd0912a1f1e6cdc9e5fd25d15f4f22cc11a
http://git.alpinelinux.org/aports/commit/?id=1aeb9d76f321c652de13c181f2775af18eb8c42d


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###