Vulnerability Description
When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to be sent through the proxy to another server. This behavior is disallowed by default when a proxy is manually configured, but when enabled could allow for attacks on services and tools that bind to the localhost for networked behavior if they are accessed through browsing. This vulnerability affects Firefox < 65.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 65.0 |
| Canonical | Ubuntu Linux | 14.04 |
| Debian | Debian Linux | 8.0 |
| Redhat | Enterprise Linux | 8.0 |
| Redhat | Enterprise Linux Desktop | 6.0 |
| Redhat | Enterprise Linux Eus | 8.1 |
| Redhat | Enterprise Linux Server | 6.0 |
| Redhat | Enterprise Linux Server Aus | 7.6 |
| Redhat | Enterprise Linux Server Eus | 7.6 |
| Redhat | Enterprise Linux Server Tus | 7.6 |
| Redhat | Enterprise Linux Workstation | 6.0 |
| Opensuse | Leap | 15.0 |
References
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00035.htmlBroken LinkMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00043.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00023.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00043.htmlMailing ListThird Party Advisory
- http://www.securityfocus.com/bid/106773Broken LinkThird Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2019:0622Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0623Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0680Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0681Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:0966Third Party Advisory
- https://access.redhat.com/errata/RHSA-2019:1144Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/03/msg00024.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/04/msg00000.htmlMailing ListThird Party Advisory
- https://seclists.org/bugtraq/2019/Apr/0Mailing ListThird Party Advisory
- https://seclists.org/bugtraq/2019/Mar/28Mailing ListThird Party Advisory
FAQ
What is CVE-2018-18506?
CVE-2018-18506 is a vulnerability with a CVSS score of 5.9 (MEDIUM). When proxy auto-detection is enabled, if a web server serves a Proxy Auto-Configuration (PAC) file or if a PAC file is loaded locally, this PAC file can specify that requests to the localhost are to b...
How severe is CVE-2018-18506?
CVE-2018-18506 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-18506?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox, Canonical Ubuntu Linux, Debian Debian Linux, Redhat Enterprise Linux, Redhat Enterprise Linux Desktop.