The good folks at Firefox have released their latest version, 39.0.3, in response to vulnerability CVE-2015-4495, which has been seen in the wild and allows an attacker to read and steal sensitive local files. The vulnerability takes advantage of the interaction between the JavaScript context separation and the PDF Viewer. The exploit works by injecting a JavaScript payload into the local file context, which allows it to search and upload local files. Mozilla products that do not contain the PDF viewer are not vulnerable, as well as Mac systems.
tony d0t carothers --gmail |
Tony 150 Posts ISC Handler Aug 7th 2015 |
Thread locked Subscribe |
Aug 7th 2015 5 years ago |
Basically, if you are a web developer and use Firefox, change your passwords and ssh certificates.
The exploit is targeted at people who access websites for development and maintenance. |
Anonymous |
Quote |
Aug 8th 2015 5 years ago |
This bug does not only allow to read any local file, but also to (over)WRITE local files, and can thus be (ab)used to execute arbitary code, leading to RCE.
|
Anonymous |
Quote |
Aug 8th 2015 5 years ago |
Anyone know of which IPs/URL it's would have been hitting?
Can't find anything in the write-ups that would allow admins to check. |
Marquis 7 Posts |
Quote |
Aug 10th 2015 5 years ago |
Sign Up for Free or Log In to start participating in the conversation!