cve/2016/CVE-2016-5284.md

19 lines
919 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-5284](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
### POC
#### Reference
- https://hackernoon.com/tor-browser-exposed-anti-privacy-implantation-at-mass-scale-bd68e9eb1e95
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/wisespace-io/cve-search