CVE-2023-25734
📋 TL;DR
This vulnerability allows attackers to craft malicious Windows .url shortcut files that, when downloaded and opened in Firefox on Windows, can trigger unauthorized network requests and potentially leak NTLM credentials to attacker-controlled servers. It affects Firefox, Thunderbird, and Firefox ESR on Windows operating systems only.
💻 Affected Systems
- Firefox
- Thunderbird
- Firefox ESR
📦 What is this software?
Firefox by Mozilla
Firefox Esr by Mozilla
Thunderbird by Mozilla
⚠️ Risk & Real-World Impact
Worst Case
NTLM credential theft leading to lateral movement, privilege escalation, and domain compromise in enterprise environments.
Likely Case
Credential leakage to attacker-controlled servers, enabling further attacks against the compromised user.
If Mitigated
No impact if systems are patched or workarounds are implemented to block .url file execution.
🎯 Exploit Status
Exploitation requires user interaction to download and open a malicious .url file. No public exploit code has been disclosed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firefox 110, Thunderbird 102.8, Firefox ESR 102.8
Vendor Advisory: https://www.mozilla.org/security/advisories/mfsa2023-05/
Restart Required: Yes
Instructions:
1. Open the affected application (Firefox/Thunderbird). 2. Go to Help > About Firefox/Thunderbird. 3. Allow the application to check for and install updates. 4. Restart the application when prompted.
🔧 Temporary Workarounds
Disable .url file handling in Firefox
windowsConfigure Firefox to not automatically handle .url files or prompt users before opening them.
about:config -> network.protocol-handler.expose.url -> set to false
Block .url file downloads
windowsUse endpoint protection or group policy to block download/execution of .url files from untrusted sources.
🧯 If You Can't Patch
- Disable automatic opening of downloaded files in Firefox settings.
- Educate users to never open .url files from untrusted sources.
🔍 How to Verify
Check if Vulnerable:
Check the application version in Help > About Firefox/Thunderbird. If version is below the patched version, the system is vulnerable.
Check Version:
firefox --version or thunderbird --version
Verify Fix Applied:
Verify the application version is at or above Firefox 110, Thunderbird 102.8, or Firefox ESR 102.8.
📡 Detection & Monitoring
Log Indicators:
- Unexpected network connections to unknown IPs after .url file download
- Firefox/Thunderbird process accessing remote SMB shares
Network Indicators:
- NTLM authentication attempts to unexpected external IPs
- SMB traffic to non-corporate destinations
SIEM Query:
source="firefox.log" AND (url_download OR .url) AND dest_ip NOT IN corporate_ips
🔗 References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1784451
- https://bugzilla.mozilla.org/show_bug.cgi?id=1809923
- https://bugzilla.mozilla.org/show_bug.cgi?id=1810143
- https://bugzilla.mozilla.org/show_bug.cgi?id=1812338
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1784451
- https://bugzilla.mozilla.org/show_bug.cgi?id=1809923
- https://bugzilla.mozilla.org/show_bug.cgi?id=1810143
- https://bugzilla.mozilla.org/show_bug.cgi?id=1812338
- https://www.mozilla.org/security/advisories/mfsa2023-05/
- https://www.mozilla.org/security/advisories/mfsa2023-06/
- https://www.mozilla.org/security/advisories/mfsa2023-07/