CVE-2018-5113
https://notcve.org/view.php?id=CVE-2018-5113
The "browser.identity.launchWebAuthFlow" function of WebExtensions is only allowed to load content over "https:" but this requirement was not properly enforced. This can potentially allow privileged pages to be loaded by the extension. This vulnerability affects Firefox < 58. La función "browser.identity.launchWebAuthFlow" de WebExtensions solo tiene permitido cargar contenido sobre "https:" pero este requisito no se cumplió correctamente. Esto puede permitir que las páginas privilegiadas se carguen mediante la extensión. • http://www.securityfocus.com/bid/102786 http://www.securitytracker.com/id/1040270 https://bugzilla.mozilla.org/show_bug.cgi?id=1425267 https://usn.ubuntu.com/3544-1 https://www.mozilla.org/security/advisories/mfsa2018-02 • CWE-862: Missing Authorization •
CVE-2018-5105
https://notcve.org/view.php?id=CVE-2018-5105
WebExtensions can bypass user prompts to first save and then open an arbitrarily downloaded file. This can result in an executable file running with local user privileges without explicit user consent. This vulnerability affects Firefox < 58. WebExtensions puede omitir los mensajes de diálogo del usuario para primero guardar y luego abrir un archivo descargado arbitrariamente. Esto puede resultar en la ejecución de un archivo ejecutable con privilegios de usuario locales sin el consentimiento explícito del usuario. • http://www.securityfocus.com/bid/102786 http://www.securitytracker.com/id/1040270 https://bugzilla.mozilla.org/show_bug.cgi?id=1390882 https://usn.ubuntu.com/3544-1 https://www.mozilla.org/security/advisories/mfsa2018-02 •
CVE-2018-5111
https://notcve.org/view.php?id=CVE-2018-5111
When the text of a specially formatted URL is dragged to the addressbar from page content, the displayed URL can be spoofed to show a different site than the one loaded. This allows for phishing attacks where a malicious page can spoof the identify of another site. This vulnerability affects Firefox < 58. Cuando el texto de una URL especialmente formateada se arrastra a la barra de dirección desde el contenido de la página, la URL mostrada se puede suplantar para mostrar un sitio diferente que el que se ha cargado. Esto permite que se realicen ataques de phishing en los que una página maliciosa puede suplantar la identidad de otro sitio. • http://www.securityfocus.com/bid/102786 http://www.securitytracker.com/id/1040270 https://bugzilla.mozilla.org/show_bug.cgi?id=1321619 https://usn.ubuntu.com/3544-1 https://www.mozilla.org/security/advisories/mfsa2018-02 • CWE-20: Improper Input Validation •
CVE-2018-5112
https://notcve.org/view.php?id=CVE-2018-5112
Development Tools panels of an extension are required to load URLs for the panels as relative URLs from the extension manifest file but this requirement was not enforced in all instances. This could allow the development tools panel for the extension to load a URL that it should not be able to access, including potentially privileged pages. This vulnerability affects Firefox < 58. Los paneles de las herramientas de desarrollo de una extensión son necesarios para cargar URL para los paneles como URL relativas desde el archivo manifest de la extensión, pero este requisito no se cumple en todas las instancias. Esto podría permitir que el panel de herramientas de desarrollo para la extensión cargue una URL a la que no se debería tener acceso, incluyendo páginas potencialmente privilegiadas. • http://www.securityfocus.com/bid/102786 http://www.securitytracker.com/id/1040270 https://bugzilla.mozilla.org/show_bug.cgi?id=1425224 https://usn.ubuntu.com/3544-1 https://www.mozilla.org/security/advisories/mfsa2018-02 • CWE-552: Files or Directories Accessible to External Parties •
CVE-2018-1000005 – curl: Out-of-bounds read in code handling HTTP/2 trailers
https://notcve.org/view.php?id=CVE-2018-1000005
libcurl 7.49.0 to and including 7.57.0 contains an out bounds read in code handling HTTP/2 trailers. It was reported (https://github.com/curl/curl/pull/2231) that reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required. The problem is that the code that creates HTTP/1-like headers from the HTTP/2 trailer data once appended a string like `:` to the target buffer, while this was recently changed to `: ` (a space was added after the colon) but the following math wasn't updated correspondingly. When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to client write. This could lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something. libcurl 7.49.0 hasta e incluyendo la versión 7.57.0 contiene una lectura fuera de límites en los trailers de manipulación de código HTTP/2. • http://www.securitytracker.com/id/1040273 https://access.redhat.com/errata/RHSA-2019:1543 https://curl.haxx.se/docs/adv_2018-824a.html https://github.com/curl/curl/pull/2231 https://usn.ubuntu.com/3554-1 https://www.debian.org/security/2018/dsa-4098 https://access.redhat.com/security/cve/CVE-2018-1000005 https://bugzilla.redhat.com/show_bug.cgi?id=1536013 • CWE-125: Out-of-bounds Read •