Closed Bug 1333225 Opened 3 years ago Closed 3 years ago

Blocklist WebEx add-ons with public remote-code execution vulnerability

Categories

(Toolkit :: Blocklist Policy Requests, defect)

defect
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: dveditz, Assigned: jorgev)

Details

(Keywords: sec-critical)

Tavis Ormandy just tweeted about a bug in the Chrome version of the WebEx Extension that allows RCE from any page that includes a magic string in its URL.

https://twitter.com/taviso/status/823642226093760512

The tweet links to the Project Zero bug which is now public and contains the script your page could need to include to execute shell commands on the client's machine. Searching DXR it appears we have at least 5 add-ons that contain this magic string. Have not searched to see if there are other WebEx add-ons that use a different Firefox-specific url but that would seem unlikely (if they're the same then they don't need to UA sniff to serve the right page).
The first one looks like it is the Cisco WebEx Extension on AMO, judging by the id number thing.
  https://addons.mozilla.org/en-US/firefox/addon/cisco-webex-extension/?src=search
Blocked: https://addons.mozilla.org/en-US/firefox/blocked/i1522
Assignee: nobody → jorge
Status: NEW → RESOLVED
Closed: 3 years ago
Resolution: --- → FIXED
Thanks for the quick turnaround.
You need to log in before you can comment on or make changes to this bug.