Spoofing attack in Mozilla Firefox - CVE-2018-12399
Published: October 24, 2018
Vulnerability identifier: #VU15498
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-12399
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Mozilla
Affected software:
Mozilla Firefox
Mozilla Firefox
Detailed vulnerability description
The vulnerability allows a remote attacker to conduct spoofing attack on the target system.
The weakness exists due to the API accepts a title argument when a new protocol handler is registered. A remote attacker can trick the victim into visiting a specially crafted website, users about which domain is registering the new protocol to spoof protocol registration notification bar
The weakness exists due to the API accepts a title argument when a new protocol handler is registered. A remote attacker can trick the victim into visiting a specially crafted website, users about which domain is registering the new protocol to spoof protocol registration notification bar
How to mitigate CVE-2018-12399
Update to version 63.0.