CVE-2015-0802

Firefox PDF.js Privileged Javascript Injection

Title source: metasploit

Description

Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.

Exploits (3)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/37958
metasploit WORKING POC MANUAL
by Unknown, Marius Mlynski, joev · rubypocfirefox
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/browser/firefox_pdfjs_privilege_escalation.rb
metasploit WORKING POC MANUAL
by joev · rubypocfirefox
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/browser/firefox_proxy_prototype.rb

Scores

EPSS 0.8039
EPSS Percentile 99.1%

Details

CWE
CWE-264
Status published
Products (6)
canonical/ubuntu_linux 12.04
canonical/ubuntu_linux 14.04
canonical/ubuntu_linux 14.10
mozilla/firefox < 36.0.4
opensuse/opensuse 13.1
opensuse/opensuse 13.2
Published Apr 01, 2015
Tracked Since Feb 18, 2026