CVE-2019-12966

9.8 CRITICAL

📋 TL;DR

FeHelper browser extension versions through June 19, 2019 contain a code injection vulnerability in JSON parsing functionality. Attackers can execute arbitrary JavaScript code by crafting malicious JSON input, potentially compromising user sessions and browser security. This affects all users of vulnerable FeHelper versions across Chrome, Firefox, and other supported browsers.

💻 Affected Systems

Products:
  • FeHelper browser extension
Versions: All versions through 2019-06-19
Operating Systems: Windows, macOS, Linux, All supported OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all browser platforms where FeHelper is installed (Chrome, Firefox, etc.). Vulnerability is active whenever the extension is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full browser compromise allowing attackers to steal credentials, session cookies, sensitive data, install malware, or perform actions as the authenticated user.

🟠

Likely Case

Session hijacking, credential theft, and data exfiltration from the browser context where FeHelper is active.

🟢

If Mitigated

Limited impact if extension is disabled or removed, though users may lose functionality.

🌐 Internet-Facing: HIGH - Browser extensions process content from any website visited, making all web browsing potentially exploitable.
🏢 Internal Only: HIGH - Same risk applies to internal applications as external websites due to browser extension architecture.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept demonstrates simple JavaScript execution via crafted JSON. Attack requires user to visit malicious website or process malicious JSON data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2019-06-19

Vendor Advisory: https://github.com/zxlie/FeHelper/issues/63

Restart Required: No

Instructions:

1. Open browser extensions page. 2. Find FeHelper extension. 3. Check for updates or remove if no update available. 4. If updating manually, download latest version from official repository.

🔧 Temporary Workarounds

Disable FeHelper Extension

all

Temporarily disable the FeHelper extension to prevent exploitation.

Browser-specific: chrome://extensions/ or about:addons

Remove FeHelper Extension

all

Completely remove the vulnerable extension until patched version is available.

Browser-specific removal via extensions management page

🧯 If You Can't Patch

  • Disable FeHelper extension immediately in all browsers
  • Implement Content Security Policy (CSP) headers on web applications to restrict script execution

🔍 How to Verify

Check if Vulnerable:

Check FeHelper version in browser extensions page. If version date is 2019-06-19 or earlier, you are vulnerable.

Check Version:

Browser-specific: Check extensions management page for FeHelper version details

Verify Fix Applied:

Verify FeHelper version is updated beyond 2019-06-19 or extension is removed/disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript execution in browser context
  • FeHelper extension errors or crashes

Network Indicators:

  • Requests to unexpected domains following JSON processing
  • Unusual data exfiltration patterns

SIEM Query:

Browser extension logs showing FeHelper activity with suspicious JSON payloads containing function() or eval() patterns

🔗 References

📤 Share & Export