CVE-2015-0802

Firefox PDF.js Privileged Javascript Injection

Title source: metasploit

Description

Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.

Exploits (3)

metasploit WORKING POC MANUAL
by Unknown, Marius Mlynski, joev · rubypocfirefox
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/browser/firefox_pdfjs_privilege_escalation.rb
exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/37958
metasploit WORKING POC MANUAL
by joev · rubypocfirefox
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/browser/firefox_proxy_prototype.rb

Scores

EPSS 0.8039
EPSS Percentile 99.1%

Classification

CWE
CWE-264
Status draft

Affected Products (6)

opensuse/opensuse
opensuse/opensuse
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
mozilla/firefox < 36.0.4

Timeline

Published Apr 01, 2015
Tracked Since Feb 18, 2026