CVE-2024-32986

9.6 CRITICAL

📋 TL;DR

This vulnerability allows malicious Progressive Web Apps (PWAs) to inject arbitrary code execution commands into desktop configuration files on Linux and PortableApps.com platforms. When a user launches a compromised web app, it can execute arbitrary system commands with the user's privileges. This affects all Linux and PortableApps.com users of PWAsForFirefox versions before 2.12.0.

💻 Affected Systems

Products:
  • PWAsForFirefox
Versions: All versions up to (excluding) 2.12.0
Operating Systems: Linux, PortableApps.com Platform
Default Config Vulnerable: ⚠️ Yes
Notes: Windows and macOS users are not affected by the code execution vulnerability but should still update for other fixes.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise via arbitrary code execution with user privileges, potentially leading to privilege escalation, data theft, or ransomware deployment.

🟠

Likely Case

Malicious web app executes arbitrary commands to steal user data, install malware, or establish persistence on the system.

🟢

If Mitigated

No impact if patched to version 2.12.0 or if using Windows/macOS platforms.

🌐 Internet-Facing: MEDIUM - Requires user to install a malicious PWA, which could be distributed via phishing or compromised websites.
🏢 Internal Only: LOW - Primarily affects individual user workstations rather than internal servers or infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Exploitation requires creating a malicious PWA with crafted properties.

Exploitation requires user interaction to install the malicious PWA, but once installed, code executes automatically on launch.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.12.0

Vendor Advisory: https://github.com/filips123/PWAsForFirefox/security/advisories/GHSA-jmhv-m7v5-g5jq

Restart Required: Yes

Instructions:

1. Open Firefox. 2. Go to Add-ons Manager (Ctrl+Shift+A). 3. Find PWAsForFirefox. 4. Click 'Check for updates'. 5. Update to version 2.12.0. 6. Restart Firefox.

🔧 Temporary Workarounds

No known workarounds

all

The advisory states there are no known workarounds for this vulnerability.

🧯 If You Can't Patch

  • Temporarily disable or uninstall PWAsForFirefox extension until patching is possible.
  • Avoid installing new PWAs and be cautious with existing PWAs from untrusted sources.

🔍 How to Verify

Check if Vulnerable:

Check PWAsForFirefox version in Firefox Add-ons Manager. If version is below 2.12.0, you are vulnerable if using Linux or PortableApps.com.

Check Version:

Not applicable - check via Firefox Add-ons Manager interface.

Verify Fix Applied:

Confirm version is 2.12.0 or higher in Firefox Add-ons Manager.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Exec commands in XDG Desktop Entries or AppInfo.ini files
  • Suspicious process execution from PWA launchers

Network Indicators:

  • Unusual outbound connections from Firefox/PWA processes

SIEM Query:

Process creation where parent process is Firefox and command line contains suspicious patterns from PWA directories.

🔗 References

📤 Share & Export