Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.
Published 2015-04-01 10:59:04
Updated 2018-10-30 16:27:36
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2015-0802

Probability of exploitation activity in the next 30 days: 39.65%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 97 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2015-0802

  • Firefox Proxy Prototype Privileged Javascript Injection
    Disclosure Date: 2014-01-20
    First seen: 2020-04-26
    exploit/multi/browser/firefox_proxy_prototype
    This exploit gains remote code execution on Firefox 31-34 by abusing a bug in the XPConnect component and gaining a reference to the privileged chrome:// window. This exploit requires the user to click anywhere on the page to trigger the vulnerability. Authors: - jo
  • Firefox PDF.js Privileged Javascript Injection
    Disclosure Date: 2015-03-31
    First seen: 2020-04-26
    exploit/multi/browser/firefox_pdfjs_privilege_escalation
    This module gains remote code execution on Firefox 35-36 by abusing a privilege escalation bug in resource:// URIs. PDF.js is used to exploit the bug. This exploit requires the user to click anywhere on the page to trigger the vulnerability. Authors: - Unkno

CVSS scores for CVE-2015-0802

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
5.0
MEDIUM AV:N/AC:L/Au:N/C:N/I:P/A:N
10.0
2.9
NIST

CWE ids for CVE-2015-0802

  • Assigned by: nvd@nist.gov (Primary)

References for CVE-2015-0802

Products affected by CVE-2015-0802

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!