#VU28368 Information disclosure in Firefox for iOS


Published: 2020-05-29 | Updated: 2020-07-15

Vulnerability identifier: #VU28368

Vulnerability risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2020-12404

CWE-ID: CWE-200

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Firefox for iOS
Mobile applications / Apps for mobile phones

Vendor: Mozilla

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due in native-to-JS bridging implementation that requires a unique token to be passed that ensures non-app code can't call the bridging functions. A remote attacker can create a specially crafted web page, trick the victim into downloading files and obtain token. This token can be used for further attacks against the application.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Firefox for iOS: 8.0 - 25.0


External links
http://www.mozilla.org/en-US/security/advisories/mfsa2020-19/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability