Search for vulnerabilities
Vulnerability ID | VCID-xvrc-xsy6-aaaj |
Aliases |
CVE-2012-3993
|
Summary | CVE-2012-3993 CVE-2012-4184 Mozilla: Chrome Object Wrapper (COW) does not disallow acces to privileged functions or properties (MFSA 2012-83) |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 9.0 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
CWE-269 | Improper Privilege Management |
Data source | Exploit-DB |
---|---|
Date added | Dec. 24, 2013 |
Description | Mozilla Firefox 5.0 < 15.0.1 - __exposedProps__ XCS Code Execution (Metasploit) |
Ransomware campaign use | Known |
Source publication date | Aug. 6, 2013 |
Exploit type | local |
Platform | multiple |
Source update date | April 1, 2017 |
Source URL | https://github.com/rapid7/metasploit-framework/blob/72caeaa72f843ec3534e272427c3915ef498b2f9/modules/exploits/multi/browser/firefox_proto_crmfrequest.rb |
Data source | Metasploit |
---|---|
Description | On versions of Firefox from 5.0 to 15.0.1, the InstallTrigger global, when given invalid input, would throw an exception that did not have an __exposedProps__ property set. By re-setting this property on the exception object's prototype, the chrome-based defineProperty method is made available. With the defineProperty method, functions belonging to window and document can be overridden with a function that gets called from chrome-privileged context. From here, another vulnerability in the crypto.generateCRMFRequest function is used to "peek" into the context's private scope. Since the window does not have a chrome:// URL, the insecure parts of Components.classes are not available, so instead the AddonManager API is invoked to silently install a malicious plugin. |
Note | {} |
Ransomware campaign use | Unknown |
Source publication date | Aug. 6, 2013 |
Platform | Java,Linux,OSX,Solaris,Windows |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/multi/browser/firefox_proto_crmfrequest.rb |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.79404 |
EPSS Score | 0.00657 |
Published At | Dec. 17, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |