2024-07-14 02:06:08 +00:00

76 lines
4.3 KiB
JSON

{
"id": "CVE-2024-32986",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-05-03T10:15:07.767",
"lastModified": "2024-05-03T12:48:41.067",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PWAsForFirefox is a tool to install, manage and use Progressive Web Apps (PWAs) in Mozilla Firefox. Due to improper sanitization of web app properties (such as name, description, shortcuts), web apps were able to inject additional lines into XDG Desktop Entries (on Linux) and `AppInfo.ini` (on PortableApps.com). This allowed malicious web apps to introduce keys like `Exec`, which could run arbitrary code when the affected web app was launched. This vulnerability affects all Linux and PortableApps.com users of all PWAsForFirefox versions up to (excluding) 2.12.0. Windows and macOS users are not affected. This vulnerability has been fixed in commit `9932d4b` which has been included in release in v2.12.0. The main fix is implemented in the native part, but the extension also contains additional fixes. All Linux and PortableApps.com users are advised to update to this version as soon as possible. It is also recommended for Windows and macOS users to update to this version, as it contains additional fixes related to properties sanitization. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "PWAsForFirefox es una herramienta para instalar, administrar y utilizar aplicaciones web progresivas (PWA) en Mozilla Firefox. Debido a una sanitizaci\u00f3n inadecuada de las propiedades de la aplicaci\u00f3n web (como nombre, descripci\u00f3n, accesos directos), las aplicaciones web pudieron inyectar l\u00edneas adicionales en XDG Desktop Entries (en Linux) y `AppInfo.ini` (en PortableApps.com). Esto permiti\u00f3 que aplicaciones web maliciosas introdujeran claves como \"Exec\", que pod\u00edan ejecutar c\u00f3digo arbitrario cuando se iniciaba la aplicaci\u00f3n web afectada. Esta vulnerabilidad afecta a todos los usuarios de Linux y PortableApps.com de todas las versiones de PWAsForFirefox hasta (excluida) 2.12.0. Los usuarios de Windows y macOS no se ven afectados. Esta vulnerabilidad se solucion\u00f3 en la confirmaci\u00f3n `9932d4b` que se incluy\u00f3 en la versi\u00f3n v2.12.0. La soluci\u00f3n principal se implementa en la parte nativa, pero la extensi\u00f3n tambi\u00e9n contiene correcciones adicionales. Se recomienda a todos los usuarios de Linux y PortableApps.com que actualicen a esta versi\u00f3n lo antes posible. Tambi\u00e9n se recomienda que los usuarios de Windows y macOS actualicen a esta versi\u00f3n, ya que contiene correcciones adicionales relacionadas con la desinfecci\u00f3n de propiedades. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-150"
},
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-93"
}
]
}
],
"references": [
{
"url": "https://github.com/filips123/PWAsForFirefox/commit/9932d4b289631d447f88ace09a2fabafe4cd5bd5",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/filips123/PWAsForFirefox/releases/tag/v2.12.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/filips123/PWAsForFirefox/security/advisories/GHSA-jmhv-m7v5-g5jq",
"source": "security-advisories@github.com"
}
]
}