The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6.
Metrics
Affected Vendors & Products
References
History
Mon, 13 Jan 2025 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6. | The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6. |
Thu, 09 Jan 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | firefox: WebChannel APIs susceptible to confused deputy attack | |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
|
Weaknesses | CWE-441 | |
CPEs | cpe:/a:redhat:enterprise_linux:8 cpe:/a:redhat:enterprise_linux:9 cpe:/a:redhat:rhel_aus:8.4 cpe:/a:redhat:rhel_e4s:8.4 cpe:/a:redhat:rhel_eus:9.2 cpe:/a:redhat:rhel_tus:8.4 cpe:/o:redhat:rhel_els:7 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat rhel Aus Redhat rhel E4s Redhat rhel Els Redhat rhel Eus Redhat rhel Tus |
|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 09 Jan 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6. | The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird ESR < 128.6. |
References |
|
Wed, 08 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-863 | |
Metrics |
cvssV3_1
|
Tue, 07 Jan 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mozilla
Published: 2025-01-07T16:07:05.787Z
Updated: 2025-01-13T21:54:58.675Z
Reserved: 2025-01-06T14:48:59.270Z
Link: CVE-2025-0237
Vulnrichment
Updated: 2025-01-08T16:01:12.491Z
NVD
Status : Awaiting Analysis
Published: 2025-01-07T16:15:38.323
Modified: 2025-01-13T22:15:14.740
Link: CVE-2025-0237
Redhat