7.5 CVE-2024-8383
Firefox normally asks for confirmation before asking the operating system to find an application to handle a scheme that the browser does not support. It did not ask before doing so for the Usenet-related schemes news: and snews:. Since most operating systems don't have a trusted newsreader installed by default, an unscrupulous program that the user downloaded could register itself as a handler. The website that served the application download could then launch that application at will. This vulnerability affects Firefox < 130, Firefox ESR < 128.2, and Firefox ESR < 115.15.
https://nvd.nist.gov/vuln/detail/CVE-2024-8383
Categories
CWE-NVD-noinfo
CWE-1188 : Initialization of a Resource with an Insecure Default
The product initializes or sets a resource with a default that is intended to be changed by the administrator, but the default is not secure. insecure default variable initialization in BIOS firmware for a hardware board allows DoS A generic database browser interface has a default mode that exposes a web server to the network, allowing queries to the database.
References
security@mozilla.org
https://bugzilla.mozilla.org/show_bug.cgi?id=1908496 Issue Tracking Permissions Required |
https://www.mozilla.org/security/advisories/mfsa2024-39/ Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2024-40/ Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2024-41/ Vendor Advisory |
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* | < 130.0 | |
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* | < 115.15 | |
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:* | >= 128.0 | < 128.2 |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
665 | Exploitation of Thunderbolt Protection Flaws |
Very High |
MITRE
Techniques
id | description |
---|---|
T1211 | Exploitation for Defensive Evasion |
T1542.002 | Pre-OS Boot:Component Firmware |
T1556 | Modify Authentication Process |
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation. |
Mitigations
id | description |
---|---|
T1211 | Update software regularly by employing patch management for internal enterprise endpoints and servers. |
T1542.002 | Perform regular firmware updates to mitigate risks of exploitation and/or abuse. |
T1556 | Ensure that proper policies are implemented to dictate the the secure enrollment and deactivation of authentication mechanisms, such as MFA, for user accounts. |
© 2022 The MITRE Corporation. Esta obra se reproduce y distribuye con el permiso de The MITRE Corporation. |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.