Access Restriction Bypass Affecting mozilla package, versions [,60.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.51% (77th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-MOZILLA-2379171
  • published26 Jan 2022
  • disclosed11 Jun 2018
  • creditUnknown

Introduced: 11 Jun 2018

CVE-2018-5163  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade mozilla to version 60.0 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass. If a malicious attacker has used another vulnerability to gain full control over a content process, they may be able to replace the alternate data resources stored in the JavaScript Start-up Bytecode Cache (JSBC) for other JavaScript code. If the parent process then runs this replaced code, the executed script would be run with the parent process' privileges, escaping the sandbox on content processes. This vulnerability affects Firefox < 60.

CVSS Scores

version 3.1