Man-in-the-middle attack vulnerability in Add-on updates in Mozilla Firefox or Firefox ESR via a malicious signed add-on (MAC OS X)ID: oval:org.secpod.oval:def:38077 | Date: (C)2016-11-16 (M)2023-12-20 |
Class: VULNERABILITY | Family: macos |
The host is installed with Mozilla Firefox before 50.0 or Firefox ESR before 45.5 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the applications, which fail to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. Successful exploitation allows man-in-the-middle attackers to provide a malicious signed add-on instead of a valid update.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Product: |
Mozilla Firefox |
Mozilla Firefox ESR |