Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.
Published 2015-04-01 10:59:15
Updated 2017-09-17 01:29:01
View at NVD,   CVE.org

Exploit prediction scoring system (EPSS) score for CVE-2015-0816

Probability of exploitation activity in the next 30 days: 96.39%

Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ

Metasploit modules for CVE-2015-0816

  • Firefox PDF.js Privileged Javascript Injection
    Disclosure Date: 2015-03-31
    First seen: 2020-04-26
    exploit/multi/browser/firefox_pdfjs_privilege_escalation
    This module gains remote code execution on Firefox 35-36 by abusing a privilege escalation bug in resource:// URIs. PDF.js is used to exploit the bug. This exploit requires the user to click anywhere on the page to trigger the vulnerability. Authors: - Unkno

CVSS scores for CVE-2015-0816

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source
5.0
MEDIUM AV:N/AC:L/Au:N/C:N/I:P/A:N
10.0
2.9
NIST

CWE ids for CVE-2015-0816

  • Assigned by: nvd@nist.gov (Primary)

References for CVE-2015-0816

Products affected by CVE-2015-0816

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!