Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4...
High severity
Unreviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Oct 21, 2024
Description
Published by the National Vulnerability Database
Sep 22, 2016
Published to the GitHub Advisory Database
May 14, 2022
Last updated
Oct 21, 2024
Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird < 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
References