Spoofing attack in firefox (Alpine package)



Published: 2020-05-06
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2020-12394
CWE-ID CWE-451
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
firefox (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Spoofing attack

EUVDB-ID: #VU27537

Risk: Low

CVSSv3.1: 2.8 [CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-12394

CWE-ID: CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)

Exploit availability: No

Description

The vulnerability allows a local user to perform spoofing attack.

The vulnerability exists due to a logic flaw in the location bar implementation. A local user can spoof  the current location by selecting a different origin and removing focus from the input element.

Mitigation

Install update from vendor's website.

Vulnerable software versions

firefox (Alpine package): 70.0-r0 - 75.0-r2

External links

http://git.alpinelinux.org/aports/commit/?id=c9413fd0912a1f1e6cdc9e5fd25d15f4f22cc11a


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###