Security Severity Ratings/Client: Difference between revisions
(Update the severity of spoofing bugs) |
(→csectype- Keywords: added -mitigation-bypass and -clickjacking, made descriptions more consistent) |
||
Line 142: | Line 142: | ||
|csectype-bounds || client security issues due to incorrect boundary conditions (read or write) | |csectype-bounds || client security issues due to incorrect boundary conditions (read or write) | ||
|- | |- | ||
|csectype- | |csectype-clickjacking || client security issues due to techniques that cause a user to unintentionally click or tap on a browser control, either by obscuring the true target of the click or by causing the target to appear by surprise in place of the item the user intended to click or tap | ||
|- | |- | ||
|csectype- | |csectype-disclosure || client issues that cause disclosure of sensitive user data or personal information (see also csectype-side-channel and csectype-sop) | ||
|- | |- | ||
|csectype-framepoisoning || client | |csectype-dos || client Denial of Service issues (use wsec-dos for web server denial of service as these tend to be more severe) | ||
|- | |||
|csectype-framepoisoning || client crashes caused by dereferencing a poisoned (deleted) nsIFrame object (presumed to be limited to a Denial of Service) | |||
|- | |- | ||
|csectype-intoverflow || client security issues due to integer overflow | |csectype-intoverflow || client security issues due to integer overflow | ||
Line 152: | Line 154: | ||
|csectype-jit || client security issues due to JIT miscompilation or similar | |csectype-jit || client security issues due to JIT miscompilation or similar | ||
|- | |- | ||
|csectype-nullptr || client | |csectype-mitigation-bypass || client security issues that allow malicious content to evade protections provided by web security features like CSP and <iframe sandbox>, or user-abuse protections like the popup blocker | ||
|- | |||
|csectype-nullptr || client crashes due to a guaranteed null dereference (do not use for near-null crashes with a content-controlled offset) | |||
|- | |- | ||
|csectype-oom || | |csectype-oom || client crashes or hangs that occurs in Out Of Memory conditions | ||
|- | |- | ||
|csectype-other || client security issues that don't fit into other categories | |csectype-other || client security issues that don't fit into other categories | ||
Line 160: | Line 164: | ||
|csectype-priv-escalation || client privilege escalation security issues | |csectype-priv-escalation || client privilege escalation security issues | ||
|- | |- | ||
|csectype-race || client security | |csectype-race || client security issues due to a race condition | ||
|- | |- | ||
|csectype-sandbox-escape || | |csectype-sandbox-escape || client security issues where a low-privilege process can cause memory corruption or arbitrary code execution in a higher-privilege processs (for example, through malformed IPC messages or Shared Memory) | ||
|- | |- | ||
|csectype- | |csectype-side-channel || Disclosure of sensitive information or state through side-effects (typically, timing) | ||
|- | |- | ||
|csectype-sop || violations of the client Same Origin Policy | |csectype-sop || violations of the client Same Origin Policy including Universal-XSS (see also csectype-side-channel for less severe "leaks") | ||
|- | |- | ||
|csectype-spoof || client security | |csectype-spoof || client security issues due to UI Redress attacks or manipulation of the browser UI to fool users into taking the wrong action (excluding csectype-clickjacking issues) | ||
|- | |- | ||
|csectype-uaf || client security issues due to a use-after-free | |csectype-uaf || client security issues due to a use-after-free | ||
|- | |- | ||
|csectype-undefined || | |csectype-undefined || client security issues—or potential issues—due to undefined compiler behavior | ||
|- | |- | ||
|csectype-uninitialized || client security issues due to use of uninitialized memory | |csectype-uninitialized || client security issues due to use of uninitialized memory |
Revision as of 22:15, 8 July 2025
The page pertains specifically to Client Applications: the Firefox web browser and mobile applications. For severity ratings for Mozilla Servers and Web Properties see Security_Severity_Ratings/Web. For details about Mozilla's bug bounty program please visit the bounty pages on our official site.
Severity Ratings
Severity ratings are used to indicate how severe we believe a bug is, and help provide guidance for its urgency and priority. Generally, we ask that they only be assigned by those with experience evaluating vulnerabilities in coordination with the security team. Presently we meet weekly to triage unclassified bugs.
Severity Ratings & Examples | ||||||||
---|---|---|---|---|---|---|---|---|
The following items are keywords for the severity of an issue.
If there are mitigating circumstances that severely constrain the vulnerability, then the issue could be reduced by one level of severity. Examples of mitigating circumstances include difficulty in reproducing due to very specific timing or load order requirements, a complex or unusual set of actions the user would have to take beyond normal browsing behaviors, or an unusual software configuration not provided by our Preferences page. As a rough guide, to be considered for reduction in severity, the vulnerability should be exploitable less than 10% of the time. If in the future, default software configurations change or techniques are developed to improve the reliability of the exploit it should be elevated back to the original rating. |
Alternate Keywords
Sometimes none of the above severity ratings apply to a bug because it is not a vulnerability itself, but nonetheless is security-sensitive for other reasons and needs to be kept private. These keywords apply to those.
While we request that only the security team assign sec-high and similar ratings, we encourage you tag things sec-want and sec-audit if you feel it applies.
Alternate Keywords & Examples | ||||||||
---|---|---|---|---|---|---|---|---|
|
A historical keyword is sec-incident, which is no longer used.
Additional Security Keywords, Whiteboard Tracking Tags & Flags
In addition to characterizing the severity of an issue with the sec-
keywords, we also have sub-type keywords, whiteboard tags (standardized string), and flags we can use to further characterize a security issue.
csectype- Keywords
csectype- keywords are assigned to bugs to indicate the type of a vulnerability. Ideally these would be assigned to every vulnerability, but frequently they are not. While we request that only the security team assign sec-high and similar ratings, if you feel you can identify the type of a security bug we encourage you to classify it yourself.
Code | Description |
---|---|
csectype-bounds | client security issues due to incorrect boundary conditions (read or write) |
csectype-clickjacking | client security issues due to techniques that cause a user to unintentionally click or tap on a browser control, either by obscuring the true target of the click or by causing the target to appear by surprise in place of the item the user intended to click or tap |
csectype-disclosure | client issues that cause disclosure of sensitive user data or personal information (see also csectype-side-channel and csectype-sop) |
csectype-dos | client Denial of Service issues (use wsec-dos for web server denial of service as these tend to be more severe) |
csectype-framepoisoning | client crashes caused by dereferencing a poisoned (deleted) nsIFrame object (presumed to be limited to a Denial of Service) |
csectype-intoverflow | client security issues due to integer overflow |
csectype-jit | client security issues due to JIT miscompilation or similar |
csectype-mitigation-bypass | client security issues that allow malicious content to evade protections provided by web security features like CSP and <iframe sandbox>, or user-abuse protections like the popup blocker |
csectype-nullptr | client crashes due to a guaranteed null dereference (do not use for near-null crashes with a content-controlled offset) |
csectype-oom | client crashes or hangs that occurs in Out Of Memory conditions |
csectype-other | client security issues that don't fit into other categories |
csectype-priv-escalation | client privilege escalation security issues |
csectype-race | client security issues due to a race condition |
csectype-sandbox-escape | client security issues where a low-privilege process can cause memory corruption or arbitrary code execution in a higher-privilege processs (for example, through malformed IPC messages or Shared Memory) |
csectype-side-channel | Disclosure of sensitive information or state through side-effects (typically, timing) |
csectype-sop | violations of the client Same Origin Policy including Universal-XSS (see also csectype-side-channel for less severe "leaks") |
csectype-spoof | client security issues due to UI Redress attacks or manipulation of the browser UI to fool users into taking the wrong action (excluding csectype-clickjacking issues) |
csectype-uaf | client security issues due to a use-after-free |
csectype-undefined | client security issues—or potential issues—due to undefined compiler behavior |
csectype-uninitialized | client security issues due to use of uninitialized memory |
csectype-wildptr | client security issues due to pointer misuse not otherwise covered (see csectype-uaf, csectype-uninitialized, csectype-intoverflow, csectype-bounds) |
Whiteboard Tags
Code | Description |
---|---|
[bad-ram?] | This indicates crashes identified that have no apparant cause and fit the profile of potential bit-flips caused by bad memory. |
[pixel-stealing] | This indicates vulnerabilities related to side-channel attacks on cross-origin resources. |
[fingerprinting] | This indicates user privacy concerns relating to fingerprinting, or web breakage detected from fingerprinting defenses. |
Flags
Flag | Description | Settings | ||||||||
---|---|---|---|---|---|---|---|---|---|---|
sec-bounty | Shows the status of a bug with regards to a bounty payout per our bounty guidlines |
| ||||||||
sec-bounty-hof | Shows the status of a bug with regards to a bounty hall of fame entry |
|