- Description
- By checking the result of calls to `window.open` with specifically set protocol handlers, an attacker could determine if the application which implements that protocol handler is installed. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Thunderbird < 128.3, and Thunderbird < 131.
- Source
- security@mozilla.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
- nvd@nist.gov
- NVD-CWE-noinfo
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-203
- Hype score
- Not currently trending
#exploit #WebApp_Security CVE-2024-9398, CVE-2024-5690: Mozilla Firefox 0-day: URL protocol handler leak https://t.co/pIdud9XaiR
@akaclandestine
26 Nov 2024
364 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
#exploit #WebApp_Security CVE-2024-9398, CVE-2024-5690: Mozilla Firefox 0-day: URL protocol handler leak https://t.co/WqmRg2Fb8v
@ksg93rd
19 Nov 2024
89 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
👿Mozilla Firefoxの0-day解説記事公開👿 弊社エンジニアが発見・報告したCVE-2024-5690およびCVE-2024-9398の技術解説を公開しました。 最適化の実装差を悪用して、Webブラウザを"越えて"システム内部の情報を覗き見る手法をぜひご覧ください! https://t.co/xmrKgsCKmV https://t.co/8pMZkOPeo7
@RicercaSec_JP
16 Nov 2024
11970 Impressions
41 Retweets
139 Likes
44 Bookmarks
0 Replies
1 Quote
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DA47FFCA-3451-462C-8FFB-47143C65E65A",
"versionEndExcluding": "131.0"
},
{
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AD504E26-CAAF-43F1-B808-C7E16F2ABDA3",
"versionEndExcluding": "128.3.0"
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2B27464A-8C97-4D45-B7BE-CD1E3EA1DFD6",
"versionEndExcluding": "128.3"
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:129.0:beta:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1CF643F7-C722-44F1-827C-3974B45A3D0D"
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:129.0:beta2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "963ACFD6-B12A-4A66-A539-FD156C6F5220"
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:129.0:beta3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B9E39014-2E8F-4E19-9575-978AB56E451A"
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:129.0:beta4:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "28752A54-6016-4F6E-983B-CB54FEA19E5F"
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:129.0:beta5:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DA46E15E-0C2B-4F6E-8BA3-B7CB32C58D43"
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:129.0:beta6:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "90AD96F8-A88B-4B70-A4D2-CD7637DF239A"
}
],
"operator": "OR"
}
]
}
]