OAuth Session Fixation Vulnerability in Mozilla VPN Products
CVE-2020-15679
7.6HIGH
Key Information:
- Vendor
- Mozilla
- Vendor
- CVE Published:
- 22 December 2022
Summary
An OAuth session fixation vulnerability exists within the login flow of Mozilla VPN, enabling malicious actors to craft a deceptive login URL. When a victim logs in through this manipulated link, the attacker can gain authenticated access, provided both parties share the same source IP. This could permit attackers to monitor session states or terminate the victim's VPN sessions, compromising user security and privacy.
Affected Version(s)
Mozilla VPN Android 1.1.0 < unspecified
Mozilla VPN iOS 1.0.7 < unspecified
Mozilla VPN Windows < 1.2.2
References
CVSS V3.1
Score:
7.6
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved