cve/2023/CVE-2023-25729.md

21 lines
1.2 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-25729](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729)
![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%20102.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%20110%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Extensions%20could%20have%20opened%20external%20schemes%20without%20user%20knowledge&color=brighgreen)
### Description
Permission prompts for opening external schemes were only shown for <code>ContentPrincipals</code> resulting in extensions being able to open them without user interaction via <code>ExpandedPrincipals</code>. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
### POC
#### Reference
- https://bugzilla.mozilla.org/show_bug.cgi?id=1792138
#### Github
No PoCs found on GitHub currently.