CVE-2024-32986

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-32986
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-32986.json
Aliases
  • GHSA-jmhv-m7v5-g5jq
Published
2024-05-03T10:15:07Z
Modified
2024-05-15T01:16:26.903766Z
Summary
[none]
Details

PWAsForFirefox is a tool to install, manage and use Progressive Web Apps (PWAs) in Mozilla Firefox. Due to improper sanitization of web app properties (such as name, description, shortcuts), web apps were able to inject additional lines into XDG Desktop Entries (on Linux) and AppInfo.ini (on PortableApps.com). This allowed malicious web apps to introduce keys like Exec, which could run arbitrary code when the affected web app was launched. This vulnerability affects all Linux and PortableApps.com users of all PWAsForFirefox versions up to (excluding) 2.12.0. Windows and macOS users are not affected. This vulnerability has been fixed in commit 9932d4b which has been included in release in v2.12.0. The main fix is implemented in the native part, but the extension also contains additional fixes. All Linux and PortableApps.com users are advised to update to this version as soon as possible. It is also recommended for Windows and macOS users to update to this version, as it contains additional fixes related to properties sanitization. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/filips123/pwasforfirefox

Affected ranges

Type
GIT
Repo
https://github.com/filips123/pwasforfirefox
Events
Introduced
0The exact introduced commit is unknown
Fixed

Affected versions

v0.*

v0.1.0
v0.2.0
v0.2.1
v0.3.0
v0.3.1
v0.4.0
v0.4.1
v0.5.0

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.2.0
v1.2.1
v1.2.2
v1.3.0
v1.3.1
v1.3.2
v1.4.0

v2.*

v2.0.0
v2.0.1
v2.0.2
v2.0.3
v2.1.0
v2.1.1
v2.1.2
v2.10.0
v2.10.1
v2.11.0
v2.11.1
v2.2.0
v2.3.0
v2.4.0
v2.4.1
v2.5.0
v2.6.0
v2.6.1
v2.6.2
v2.7.0
v2.7.1
v2.7.2
v2.7.3
v2.8.0
v2.9.0
v2.9.1