Mozilla Firefox Open source web browser
Recent Mozilla Firefox Security Advisories
Advisory | Title | Published |
---|---|---|
mfsa2023-17 | Security Vulnerabilities fixed in Firefox ESR 102.11 mfsa2023-17 | May 9, 2023 |
mfsa2023-16 | Security Vulnerabilities fixed in Firefox 113 mfsa2023-16 | May 9, 2023 |
mfsa2023-14 | Security Vulnerabilities fixed in Firefox ESR 102.10 mfsa2023-14 | April 11, 2023 |
mfsa2023-13 | Security Vulnerabilities fixed in Firefox 112, Firefox for Android 112, Focus for Android 112 mfsa2023-13 | April 11, 2023 |
mfsa2023-09 | Security Vulnerabilities fixed in Firefox 111 mfsa2023-09 | March 14, 2023 |
mfsa2023-10 | Security Vulnerabilities fixed in Firefox ESR 102.9 mfsa2023-10 | March 14, 2023 |
mfsa2023-08 | Security Vulnerabilities fixed in Firefox for Android 110.1.0 mfsa2023-08 | February 28, 2023 |
mfsa2023-05 | Security Vulnerabilities fixed in Firefox 110 mfsa2023-05 | February 14, 2023 |
mfsa2023-06 | Security Vulnerabilities fixed in Firefox ESR 102.8 mfsa2023-06 | February 14, 2023 |
mfsa2023-01 | Security Vulnerabilities fixed in Firefox 109 mfsa2023-01 | January 17, 2023 |
Known Exploited Mozilla Firefox Vulnerabilities
The following Mozilla Firefox vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.
Title | Description | Added |
---|---|---|
Mozilla Firefox Security Feature Bypass Vulnerability | Moxilla Firefox allows remote attackers to bypass the Same Origin Policy to read arbitrary files or gain privileges. CVE-2015-4495 | May 25, 2022 |
Mozilla Firefox Use-After-Free Vulnerability | Mozilla Firefox contains a use-after-free vulnerability in WebGPU IPC Framework which can be exploited to perform arbitrary code execution. CVE-2022-26486 | March 7, 2022 |
Mozilla Firefox Use-After-Free Vulnerability | Mozilla Firefox contains a use-after-free vulnerability in XSLT parameter processing which can be exploited to perform arbitrary code execution. CVE-2022-26485 | March 7, 2022 |
Mozilla Firefox Information Disclosure Vulnerability | Mozilla Firefox does not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site. CVE-2013-1675 | March 3, 2022 |
By the Year
In 2023 there have been 2 vulnerabilities in Mozilla Firefox with an average score of 6.0 out of ten. Last year Firefox had 137 security vulnerabilities published. Right now, Firefox is on track to have less security vulnerabilities in 2023 than it did last year. Last year, the average CVE base score was greater by 1.52
Year | Vulnerabilities | Average Score |
---|---|---|
2023 | 2 | 6.00 |
2022 | 137 | 7.52 |
2021 | 122 | 7.10 |
2020 | 132 | 7.36 |
2019 | 107 | 7.64 |
2018 | 103 | 7.79 |
It may take a day or so for new Firefox vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Mozilla Firefox Security Vulnerabilities
Scanning a QR code that contained a javascript: URL
CVE-2019-17003
6.1 - Medium
- February 16, 2023
Scanning a QR code that contained a javascript: URL would have resulted in the Javascript being executed.
XSS
The Raccoon attack is a timing attack on DHE ciphersuites inherit in the TLS specification
CVE-2020-12413
5.9 - Medium
- February 16, 2023
The Raccoon attack is a timing attack on DHE ciphersuites inherit in the TLS specification. To mitigate this vulnerability, Firefox disabled support for DHE ciphersuites.
Side Channel Attack
When injecting an HTML base element, some requests would ignore the CSP's base-uri settings and accept the injected element's base instead
CVE-2022-40956
6.1 - Medium
- December 22, 2022
When injecting an HTML base element, some requests would ignore the CSP's base-uri settings and accept the injected element's base instead. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
XSS
An out-of-bounds read can occur when decoding H264 video
CVE-2022-3266
5.5 - Medium
- December 22, 2022
An out-of-bounds read can occur when decoding H264 video. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
Out-of-bounds Read
Mozilla developers Andrew McCreight
CVE-2022-29917
9.8 - Critical
- December 22, 2022
Mozilla developers Andrew McCreight, Gabriele Svelto, Tom Ritter and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99 and Firefox ESR 91.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
assertion failure
Firefox behaved slightly differently for already known resources when loading CSS resources involving CSS variables
CVE-2022-29916
6.5 - Medium
- December 22, 2022
Firefox behaved slightly differently for already known resources when loading CSS resources involving CSS variables. This could have been used to probe the browser history. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
Members the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103, Firefox ESR 102.1, and Firefox ESR 91.12
CVE-2022-38478
8.8 - High
- December 22, 2022
Members the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103, Firefox ESR 102.1, and Firefox ESR 91.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104.
Memory Corruption
The Performance API did not properly hide the fact whether a request cross-origin resource has observed redirects
CVE-2022-29915
4.3 - Medium
- December 22, 2022
The Performance API did not properly hide the fact whether a request cross-origin resource has observed redirects. This vulnerability affects Firefox < 100.
Mozilla developers Timothy Nikkel, Ashley Hale, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 105
CVE-2022-46885
8.8 - High
- December 22, 2022
Mozilla developers Timothy Nikkel, Ashley Hale, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 105. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 106.
Memory Corruption
An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash
CVE-2022-46881
8.8 - High
- December 22, 2022
An optimization in WebGL was incorrect in some cases, and could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 106, Firefox ESR < 102.6, and Thunderbird < 102.6.
A missing check related to tex units could have led to a use-after-free and potentially exploitable crash
CVE-2022-46880
6.5 - Medium
- December 22, 2022
A missing check related to tex units could have led to a use-after-free and potentially exploitable crash.<br />*Note*: This advisory was added on December 13th, 2022 after we better understood the impact of the issue. The fix was included in the original release of Firefox 105. This vulnerability affects Firefox ESR < 102.6, Firefox < 105, and Thunderbird < 102.6.
Dangling pointer
Mozilla developers and community members Lukas Bernhard
CVE-2022-46879
8.8 - High
- December 22, 2022
Mozilla developers and community members Lukas Bernhard, Gabriele Svelto, Randell Jesup, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 107. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 108.
An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files
CVE-2022-46872
8.6 - High
- December 22, 2022
An attacker who compromised a content process could have partially escaped the sandbox to read arbitrary files via clipboard-related IPC messages.<br>*This bug only affects Thunderbird for Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6.
Cross-Site Tracing occurs when a server will echo a request back via the Trace method
CVE-2022-45411
6.1 - Medium
- December 22, 2022
Cross-Site Tracing occurs when a server will echo a request back via the Trace method, allowing an XSS attack to access to authorization headers and cookies inaccessible to JavaScript (such as cookies protected by HTTPOnly). To mitigate this attack, browsers placed limits on <code>fetch()</code> and XMLHttpRequest; however some webservers have implemented non-standard headers such as <code>X-Http-Method-Override</code> that override the HTTP method, and made this attack possible again. Thunderbird has applied the same mitigations to the use of this and similar headers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
XSS
Through a series of popups
CVE-2022-45408
6.5 - Medium
- December 22, 2022
Through a series of popups that reuse windowName, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
If an attacker loaded a font using <code>FontFace()</code> on a background worker
CVE-2022-45407
7.5 - High
- December 22, 2022
If an attacker loaded a font using <code>FontFace()</code> on a background worker, a use-after-free could have occurred, leading to a potentially exploitable crash. This vulnerability affects Firefox < 107.
Dangling pointer
If an out-of-memory condition occurred when creating a JavaScript global
CVE-2022-45406
9.8 - Critical
- December 22, 2022
If an out-of-memory condition occurred when creating a JavaScript global, a JavaScript realm may be deleted while references to it lived on in a BaseShape. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Memory Corruption
Freeing arbitrary <code>nsIInputStream</code>'s on a different thread than creation could have led to a use-after-free and potentially exploitable crash
CVE-2022-45405
6.5 - Medium
- December 22, 2022
Freeing arbitrary <code>nsIInputStream</code>'s on a different thread than creation could have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Dangling pointer
Through a series of popup and <code>window.print()</code> calls, an attacker
CVE-2022-45404
6.5 - Medium
- December 22, 2022
Through a series of popup and <code>window.print()</code> calls, an attacker can cause a window to go fullscreen without the user seeing the notification prompt, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Service Workers should not be able to infer information about opaque cross-origin responses; but timing information for cross-origin media combined with Range requests might have
CVE-2022-45403
6.5 - Medium
- December 22, 2022
Service Workers should not be able to infer information about opaque cross-origin responses; but timing information for cross-origin media combined with Range requests might have allowed them to determine the presence or length of a media file. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Side Channel Attack
Mozilla developers Ashley Hale and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.3
CVE-2022-42932
8.8 - High
- December 22, 2022
Mozilla developers Ashley Hale and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106.
Logins saved by Firefox should be managed by the Password Manager component which uses encryption to save files on-disk
CVE-2022-42931
3.3 - Low
- December 22, 2022
Logins saved by Firefox should be managed by the Password Manager component which uses encryption to save files on-disk. Instead, the username (not password) was saved by the Form Manager to an unencrypted file on disk. This vulnerability affects Firefox < 106.
Insecure Storage of Sensitive Information
If a website called <code>window.print()</code> in a particular way, it could cause a denial of service of the browser
CVE-2022-42929
6.5 - Medium
- December 22, 2022
If a website called <code>window.print()</code> in a particular way, it could cause a denial of service of the browser, which may persist beyond browser restart depending on the user's session restore settings. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106.
Certain types of allocations were missing annotations
CVE-2022-42928
8.8 - High
- December 22, 2022
Certain types of allocations were missing annotations that, if the Garbage Collector was in a specific state, could have lead to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106.
A same-origin policy violation could have
CVE-2022-42927
8.1 - High
- December 22, 2022
A same-origin policy violation could have allowed the theft of cross-origin URL entries, leaking the result of a redirect, via <code>performance.getEntries()</code>. This vulnerability affects Thunderbird < 102.4, Firefox ESR < 102.4, and Firefox < 106.
Origin Validation Error
Mozilla developers Nika Layzell
CVE-2022-40962
8.8 - High
- December 22, 2022
Mozilla developers Nika Layzell, Timothy Nikkel, Sebastian Hengst, Andreas Pehrson, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 104 and Firefox ESR 102.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
Concurrent use of the URL parser with non-UTF-8 data was not thread-safe
CVE-2022-40960
6.5 - Medium
- December 22, 2022
Concurrent use of the URL parser with non-UTF-8 data was not thread-safe. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
Dangling pointer
During iframe navigation, certain pages did not have their FeaturePolicy fully initialized leading to a bypass
CVE-2022-40959
6.5 - Medium
- December 22, 2022
During iframe navigation, certain pages did not have their FeaturePolicy fully initialized leading to a bypass that leaked device permissions into untrusted subdocuments. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
Insecure Storage of Sensitive Information
By injecting a cookie with certain special characters, an attacker on a shared subdomain which is not a secure context could set and thus overwrite cookies
CVE-2022-40958
6.5 - Medium
- December 22, 2022
By injecting a cookie with certain special characters, an attacker on a shared subdomain which is not a secure context could set and thus overwrite cookies from a secure context, leading to session fixation and other attacks. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
Injection
Inconsistent data in instruction and data cache when creating wasm code could lead to a potentially exploitable crash
CVE-2022-40957
6.5 - Medium
- December 22, 2022
Inconsistent data in instruction and data cache when creating wasm code could lead to a potentially exploitable crash.<br>*This bug only affects Firefox on ARM64 platforms.*. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105.
Mozilla developer Nika Layzell and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103 and Firefox ESR 102.1
CVE-2022-38477
8.8 - High
- December 22, 2022
Mozilla developer Nika Layzell and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103 and Firefox ESR 102.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.2, Thunderbird < 102.2, and Firefox < 104.
Memory Corruption
An attacker could have written a value to the first element in a zero-length JavaScript array
CVE-2022-38475
6.5 - Medium
- December 22, 2022
An attacker could have written a value to the first element in a zero-length JavaScript array. Although the array was zero-length, the value was not written to an invalid memory address. This vulnerability affects Firefox < 104.
AuthZ
A website that had permission to access the microphone could record audio without the audio notification being shown
CVE-2022-38474
4.3 - Medium
- December 22, 2022
A website that had permission to access the microphone could record audio without the audio notification being shown. This bug does not allow the attacker to bypass the permission prompt - it only affects the notification shown once permission has been granted.<br />*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 104.
Exposure of Resource to Wrong Sphere
A cross-origin iframe referencing an XSLT document would inherit the parent domain's permissions (such as microphone or camera access)
CVE-2022-38473
8.8 - High
- December 22, 2022
A cross-origin iframe referencing an XSLT document would inherit the parent domain's permissions (such as microphone or camera access). This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104.
Improper Preservation of Permissions
An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin
CVE-2022-38472
6.5 - Medium
- December 22, 2022
An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104.
Origin Validation Error
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102
CVE-2022-36320
9.8 - Critical
- December 22, 2022
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 103.
Memory Corruption
When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed
CVE-2022-36319
7.5 - High
- December 22, 2022
When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed. This vulnerability affects Firefox ESR < 102.1, Firefox ESR < 91.12, Firefox < 103, Thunderbird < 102.1, and Thunderbird < 91.12.
When visiting directory listings for `chrome://` URLs as source text, some parameters were reflected
CVE-2022-36318
5.3 - Medium
- December 22, 2022
When visiting directory listings for `chrome://` URLs as source text, some parameters were reflected. This vulnerability affects Firefox ESR < 102.1, Firefox ESR < 91.12, Firefox < 103, Thunderbird < 102.1, and Thunderbird < 91.12.
Race Condition
When using the Performance API
CVE-2022-36316
6.1 - Medium
- December 22, 2022
When using the Performance API, an attacker was able to notice subtle differences between PerformanceEntries and thus learn whether the target URL had been subject to a redirect. This vulnerability affects Firefox < 103.
Open Redirect
When loading a script with Subresource Integrity
CVE-2022-36315
4.3 - Medium
- December 22, 2022
When loading a script with Subresource Integrity, attackers with an injection capability could trigger the reuse of previously cached entries with incorrect, different integrity metadata. This vulnerability affects Firefox < 103.
The MediaError message property should be consistent to avoid leaking information about cross-origin resources; however for a same-site cross-origin resource
CVE-2022-34477
7.5 - High
- December 22, 2022
The MediaError message property should be consistent to avoid leaking information about cross-origin resources; however for a same-site cross-origin resource, the message could have leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox < 102.
ASN.1 parsing of an indefinite SEQUENCE inside an indefinite GROUP could have resulted in the parser accepting malformed ASN.1
CVE-2022-34476
9.8 - Critical
- December 22, 2022
ASN.1 parsing of an indefinite SEQUENCE inside an indefinite GROUP could have resulted in the parser accepting malformed ASN.1. This vulnerability affects Firefox < 102.
SVG <code><use></code> tags
CVE-2022-34475
6.1 - Medium
- December 22, 2022
SVG <code><use></code> tags that referenced a same-origin document could have resulted in script execution if attacker input was sanitized via the HTML Sanitizer API. This would have required the attacker to reference a same-origin JavaScript file containing the script to be executed. This vulnerability affects Firefox < 102.
XSS
Even when an iframe was sandboxed with <code>
CVE-2022-34474
6.1 - Medium
- December 22, 2022
Even when an iframe was sandboxed with <code>allow-top-navigation-by-user-activation</code>, if it received a redirect header to an external protocol the browser would process the redirect and prompt the user as appropriate. This vulnerability affects Firefox < 102.
Open Redirect
The HTML Sanitizer should have sanitized the <code>href</code> attribute of SVG <code><use></code> tags; however it incorrectly did not sanitize <code>xlink:href</code> attributes
CVE-2022-34473
6.1 - Medium
- December 22, 2022
The HTML Sanitizer should have sanitized the <code>href</code> attribute of SVG <code><use></code> tags; however it incorrectly did not sanitize <code>xlink:href</code> attributes. This vulnerability affects Firefox < 102.
XSS
If there was a PAC URL set and the server
CVE-2022-34472
4.3 - Medium
- December 22, 2022
If there was a PAC URL set and the server that hosts the PAC was not reachable, OCSP requests would have been blocked, resulting in incorrect error pages being shown. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
When downloading an update for an addon, the downloaded addon update's version was not verified to match the version selected
CVE-2022-34471
6.5 - Medium
- December 22, 2022
When downloading an update for an addon, the downloaded addon update's version was not verified to match the version selected from the manifest. If the manifest had been tampered with on the server, an attacker could trick the browser into downgrading the addon to a prior version. This vulnerability affects Firefox < 102.
Session history navigations may have led to a use-after-free and potentially exploitable crash
CVE-2022-34470
9.8 - Critical
- December 22, 2022
Session history navigations may have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
Dangling pointer
Mozilla developers Andrew McCreight, Nicolas B
CVE-2022-31747
9.8 - Critical
- December 22, 2022
Mozilla developers Andrew McCreight, Nicolas B. Pierron, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100 and Firefox ESR 91.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
Internal URLs are protected by a secret UUID key, which could have been leaked to web page through the Referrer header
CVE-2022-31746
6.5 - Medium
- December 22, 2022
Internal URLs are protected by a secret UUID key, which could have been leaked to web page through the Referrer header. This vulnerability affects Firefox for iOS < 102.
AuthZ
If array shift operations are not used, the Garbage Collector may have become confused about valid objects
CVE-2022-31745
4.3 - Medium
- December 22, 2022
If array shift operations are not used, the Garbage Collector may have become confused about valid objects. This vulnerability affects Firefox < 101.
out-of-bounds array index
An attacker could have injected CSS into stylesheets accessible
CVE-2022-31744
6.5 - Medium
- December 22, 2022
An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page's Content Security Policy. This vulnerability affects Firefox ESR < 91.11, Thunderbird < 102, Thunderbird < 91.11, and Firefox < 101.
AuthZ
Firefox's HTML parser did not correctly interpret HTML comment tags, resulting in an incongruity with other browsers
CVE-2022-31743
6.5 - Medium
- December 22, 2022
Firefox's HTML parser did not correctly interpret HTML comment tags, resulting in an incongruity with other browsers. This could have been used to escape HTML comments on pages that put user-controlled data in them. This vulnerability affects Firefox < 101.
XSS
An attacker could have exploited a timing attack by sending a large number of
CVE-2022-31742
6.5 - Medium
- December 22, 2022
An attacker could have exploited a timing attack by sending a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption
CVE-2022-31741
8.8 - High
- December 22, 2022
A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
Buffer Overflow
On arm64
CVE-2022-31740
8.8 - High
- December 22, 2022
On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
When exiting fullscreen mode
CVE-2022-31738
6.5 - Medium
- December 22, 2022
When exiting fullscreen mode, an iframe could have confused the browser about the current state of fullscreen, resulting in potential user confusion or spoofing attacks. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
Authentication Bypass by Spoofing
A malicious webpage could have caused an out-of-bounds write in WebGL, leading to memory corruption and a potentially exploitable crash
CVE-2022-31737
9.8 - Critical
- December 22, 2022
A malicious webpage could have caused an out-of-bounds write in WebGL, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
Memory Corruption
A malicious website could have learned the size of a cross-origin resource that supported Range requests
CVE-2022-31736
9.8 - Critical
- December 22, 2022
A malicious website could have learned the size of a cross-origin resource that supported Range requests. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102
CVE-2022-2505
8.8 - High
- December 22, 2022
Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.1, Firefox < 103, and Thunderbird < 102.1.
Memory Corruption
If an object prototype was corrupted by an attacker, they
CVE-2022-2200
8.8 - High
- December 22, 2022
If an object prototype was corrupted by an attacker, they would have been able to set undesired attributes on a JavaScript object, leading to privileged code execution. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
Prototype Pollution
Mozilla developers Gabriele Svelto, Randell Jesup and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99
CVE-2022-29918
8.8 - High
- December 22, 2022
Mozilla developers Gabriele Svelto, Randell Jesup and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 100.
Memory Corruption
When reusing existing popups Firefox would have
CVE-2022-29914
6.5 - Medium
- December 22, 2022
When reusing existing popups Firefox would have allowed them to cover the fullscreen notification UI, which could have enabled browser spoofing attacks. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
Requests initiated through reader mode did not properly omit cookies with a SameSite attribute
CVE-2022-29912
6.1 - Medium
- December 22, 2022
Requests initiated through reader mode did not properly omit cookies with a SameSite attribute. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
Open Redirect
An improper implementation of the new iframe sandbox keyword <code>
CVE-2022-29911
6.1 - Medium
- December 22, 2022
An improper implementation of the new iframe sandbox keyword <code>allow-top-navigation-by-user-activation</code> could lead to script execution without <code>allow-scripts</code> being present. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
Clickjacking
It was possible to construct specific XSLT markup that would be able to bypass an iframe sandbox
CVE-2021-4140
10 - Critical
- December 22, 2022
It was possible to construct specific XSLT markup that would be able to bypass an iframe sandbox. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
aka Blind XPath Injection
Mozilla developers and community members Julian Hector
CVE-2021-4129
9.8 - Critical
- December 22, 2022
Mozilla developers and community members Julian Hector, Randell Jesup, Gabriele Svelto, Tyson Smith, Christian Holler, and Masayuki Nakano reported memory safety bugs present in Firefox 94. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 95, Firefox ESR < 91.4.0, and Thunderbird < 91.4.0.
Mozilla developers Gabriele Svelto
CVE-2022-46883
8.8 - High
- December 22, 2022
Mozilla developers Gabriele Svelto, Yulia Startsev, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 106. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.<br />*Note*: This advisory was added on December 13th, 2022 after discovering it was inadvertently left out of the original advisory. The fix was included in the original release of Firefox 107. This vulnerability affects Firefox < 107.
A use-after-free in WebGL extensions could have led to a potentially exploitable crash
CVE-2022-46882
9.8 - Critical
- December 22, 2022
A use-after-free in WebGL extensions could have led to a potentially exploitable crash. This vulnerability affects Firefox < 107, Firefox ESR < 102.6, and Thunderbird < 102.6.
Dangling pointer
Mozilla developers Randell Jesup
CVE-2022-46878
8.8 - High
- December 22, 2022
Mozilla developers Randell Jesup, Valentin Gosu, Olli Pettay, and the Mozilla Fuzzing Team reported memory safety bugs present in Thunderbird 102.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 108, Firefox ESR < 102.6, and Thunderbird < 102.6.
By confusing the browser
CVE-2022-46877
4.3 - Medium
- December 22, 2022
By confusing the browser, the fullscreen notification could have been delayed or suppressed, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox < 108.
A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place
CVE-2022-46874
8.8 - High
- December 22, 2022
A file with a long filename could have had its filename truncated to remove the valid extension, leaving a malicious extension in its place. This could potentially led to user confusion and the execution of malicious code.<br/>*Note*: This issue was originally included in the advisories for Thunderbird 102.6, but a patch (specific to Thunderbird) was omitted, resulting in it actually being fixed in Thunderbird 102.6.1. This vulnerability affects Firefox < 108, Thunderbird < 102.6.1, Thunderbird < 102.6, and Firefox ESR < 102.6.
Because Firefox did not implement the <code>unsafe-hashes</code> CSP directive
CVE-2022-46873
8.8 - High
- December 22, 2022
Because Firefox did not implement the <code>unsafe-hashes</code> CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108.
Injection
An out of date library (libusrsctp) contained vulnerabilities that could potentially be exploited
CVE-2022-46871
8.8 - High
- December 22, 2022
An out of date library (libusrsctp) contained vulnerabilities that could potentially be exploited. This vulnerability affects Firefox < 108.
Mozilla developers Andrew McCreight and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.4
CVE-2022-45421
8.8 - High
- December 22, 2022
Mozilla developers Andrew McCreight and Gabriele Svelto reported memory safety bugs present in Thunderbird 102.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Use tables inside of an iframe
CVE-2022-45420
6.5 - Medium
- December 22, 2022
Use tables inside of an iframe, an attacker could have caused iframe contents to be rendered outside the boundaries of the iframe, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Clickjacking
If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server
CVE-2022-45419
6.5 - Medium
- December 22, 2022
If the user added a security exception for an invalid TLS certificate, opened an ongoing TLS connection with a server that used that certificate, and then deleted the exception, Firefox would have kept the connection alive, making it seem like the certificate was still trusted. This vulnerability affects Firefox < 107.
Improper Certificate Validation
If a custom mouse cursor is specified in CSS
CVE-2022-45418
6.1 - Medium
- December 22, 2022
If a custom mouse cursor is specified in CSS, under certain circumstances the cursor could have been drawn over the browser UI, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Clickjacking
Service Workers did not detect Private Browsing Mode correctly in all cases
CVE-2022-45417
4.3 - Medium
- December 22, 2022
Service Workers did not detect Private Browsing Mode correctly in all cases, which could have led to Service Workers being written to disk for websites visited in Private Browsing Mode. This would not have persisted them in a state where they would run again, but it would have leaked Private Browsing Mode details to disk. This vulnerability affects Firefox < 107.
Clickjacking
Keyboard events reference strings like "KeyA" that were at fixed, known, and widely-spread addresses
CVE-2022-45416
6.5 - Medium
- December 22, 2022
Keyboard events reference strings like "KeyA" that were at fixed, known, and widely-spread addresses. Cache-based timing attacks such as Prime+Probe could have possibly figured out which keys were being pressed. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Side Channel Attack
When a ServiceWorker intercepted a request with <code>FetchEvent</code>
CVE-2022-45410
6.5 - Medium
- December 22, 2022
When a ServiceWorker intercepted a request with <code>FetchEvent</code>, the origin of the request was lost after the ServiceWorker took ownership of it. This had the effect of negating SameSite cookie protections. This was addressed in the spec and then in browsers. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
The garbage collector could have been aborted in several states and zones and <code>GCRuntime::finishCollection</code> may not have been called
CVE-2022-45409
8.8 - High
- December 22, 2022
The garbage collector could have been aborted in several states and zones and <code>GCRuntime::finishCollection</code> may not have been called, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.
Dangling pointer
Mozilla developers Gabriele Svelto
CVE-2022-31748
9.8 - Critical
- December 22, 2022
Mozilla developers Gabriele Svelto, Timothy Nikkel, Randell Jesup, Jon Coppeard, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 101.
If two Workers were simultaneously initializing their CacheStorage
CVE-2022-42930
7.1 - High
- December 22, 2022
If two Workers were simultaneously initializing their CacheStorage, a data race could have occurred in the <code>ThirdPartyUtil</code> component. This vulnerability affects Firefox < 106.
Race Condition
Certain network request objects were freed too early when releasing a network request handle
CVE-2022-22740
8.8 - High
- December 22, 2022
Certain network request objects were freed too early when releasing a network request handle. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Dangling pointer
Malicious websites could have tricked users into accepting launching a program to handle an external URL protocol
CVE-2022-22739
6.5 - Medium
- December 22, 2022
Malicious websites could have tricked users into accepting launching a program to handle an external URL protocol. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Applying a CSS filter effect could have accessed out of bounds memory
CVE-2022-22738
8.8 - High
- December 22, 2022
Applying a CSS filter effect could have accessed out of bounds memory. This could have lead to a heap-buffer-overflow causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Memory Corruption
Constructing audio sinks could have lead to a race condition when playing audio files and closing windows
CVE-2022-22737
7.5 - High
- December 22, 2022
Constructing audio sinks could have lead to a race condition when playing audio files and closing windows. This could have lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Dangling pointer
If Firefox was installed to a world-writable directory
CVE-2022-22736
7 - High
- December 22, 2022
If Firefox was installed to a world-writable directory, a local privilege escalation could occur when Firefox searched the current directory for system libraries. However the install directory is not world-writable by default.<br>*This bug only affects Firefox for Windows in a non-default installation. Other operating systems are unaffected.*. This vulnerability affects Firefox < 96.
If an attacker was able to corrupt the methods of an Array object in JavaScript
CVE-2022-1802
8.8 - High
- December 22, 2022
If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.
Prototype Pollution
An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object
CVE-2022-1529
8.8 - High
- December 22, 2022
An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.
Prototype Pollution
<code>NSSToken</code> objects were referenced
CVE-2022-1097
6.5 - Medium
- December 22, 2022
<code>NSSToken</code> objects were referenced via direct points, and could have been accessed in an unsafe way on different threads, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird < 91.8, Firefox < 99, and Firefox ESR < 91.8.
Dangling pointer
Mozilla developers Kershaw Chang, Ryan VanderMeulen, and Randell Jesup reported memory safety bugs present in Firefox 97
CVE-2022-0843
8.8 - High
- December 22, 2022
Mozilla developers Kershaw Chang, Ryan VanderMeulen, and Randell Jesup reported memory safety bugs present in Firefox 97. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 98.
Memory Corruption
Mozilla developers and community members Gabriele Svelto
CVE-2022-0511
8.8 - High
- December 22, 2022
Mozilla developers and community members Gabriele Svelto, Sebastian Hengst, Randell Jesup, Luan Herrera, Lars T Hansen, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 96. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 97.
Memory Corruption
Securitypolicyviolation events could have leaked cross-origin information for frame-ancestors violations
CVE-2022-22745
6.5 - Medium
- December 22, 2022
Securitypolicyviolation events could have leaked cross-origin information for frame-ancestors violations. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
When navigating from inside an iframe while requesting fullscreen access
CVE-2022-22743
4.3 - Medium
- December 22, 2022
When navigating from inside an iframe while requesting fullscreen access, an attacker-controlled tab could have made the browser unable to leave fullscreen mode. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
When inserting text while in edit mode
CVE-2022-22742
6.5 - Medium
- December 22, 2022
When inserting text while in edit mode, some characters might have lead to out-of-bounds memory access causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
Out-of-bounds Read
When resizing a popup while requesting fullscreen access, the popup would have become unable to leave fullscreen mode
CVE-2022-22741
7.5 - High
- December 22, 2022
When resizing a popup while requesting fullscreen access, the popup would have become unable to leave fullscreen mode. This vulnerability affects Firefox ESR < 91.5, Firefox < 96, and Thunderbird < 91.5.
If a document created a sandboxed iframe without <code>allow-scripts</code>, and subsequently appended an element to the iframe's document
CVE-2022-22759
9.6 - Critical
- December 22, 2022
If a document created a sandboxed iframe without <code>allow-scripts</code>, and subsequently appended an element to the iframe's document that e.g. had a JavaScript event handler - the event handler would have run despite the iframe's sandbox. This vulnerability affects Firefox < 97, Thunderbird < 91.6, and Firefox ESR < 91.6.
Remote Agent, used in WebDriver, did not validate the Host or Origin headers
CVE-2022-22757
6.5 - Medium
- December 22, 2022
Remote Agent, used in WebDriver, did not validate the Host or Origin headers. This could have allowed websites to connect back locally to the user's browser to control it. <br>*This bug only affected Firefox when WebDriver was enabled, which is not the default configuration.*. This vulnerability affects Firefox < 97.
Improper Input Validation
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Mozilla Firefox or by Mozilla? Click the Watch button to subscribe.
