Mozilla FireFox Security Technical Implementation Guide

  • Version/Release: V1R6
  • Published: 2019-12-12
  • Severity:
  • Sort:
View

Select any old version/release of this SCAP to view the previous requirements

The Mozilla FireFox Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil
b
FireFox is configured to ask which certificate to present to a web site when a certificate is required.
RMF Control
SI-4
Severity
Medium
CCI
CCI-001274
Version
DTBF050
Vuln IDs
V-15768
Rule IDs
SV-16707r1_rule
When a web site asks for a certificate for user authentication, Firefox must be configured to have the user choose which certificate to present. Websites within DOD require user authentication for access which increases security for DoD information. Access will be denied to the user if certificate management is not configured.System Administrator
Fix: F-15985r1_fix

Set the value of "security.default_personal_cert" to "Ask Every Time". Use the Mozilla.cfg file to lock the preference so users cannot change it.

b
Network shell protocol is enabled in FireFox.
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTBF105
Vuln IDs
V-15771
Rule IDs
SV-16710r3_rule
Although current versions of Firefox have this set to disabled by default, use of this option can be harmful. This would allow the browser to access the Windows shell. This could allow access to the underlying system. This check verifies that the default setting has not been changed. System Administrator
Fix: F-15988r3_fix

Procedure: Set the value of "network.protocol-handler.external.shell" to "false" and lock using the Mozilla.cfg file.

b
Firefox is not configured to prompt a user before downloading and opening required file types.
RMF Control
SI-3
Severity
Medium
CCI
CCI-001243
Version
DTBF110
Vuln IDs
V-15772
Rule IDs
SV-16711r4_rule
New file types cannot be added directly to the helper applications or plugins listing. Files with these extensions will not be allowed to use Firefox publicly available plugins and extensions to open. The application will be configured to open these files using external applications only. After a helper application or save to disk download action has been set, that action will be taken automatically for those types of files. When the user receives a dialog box asking if you want to save the file or open it with a specified application, this indicates that a plugin does not exist. The user has not previously selected a download action or helper application to automatically use for that type of file. When prompted, if the user checks the option to Do this automatically for files like this from now on, then an entry will appear for that type of file in the plugins listing and this file type is automatically opened in the future. This can be a security issue. New file types cannot be added directly to the Application plugin listing. System Administrator
Fix: F-15989r4_fix

Ensure the following extensions are not automatically opened by Firefox without user confirmation. Do not use plugins and add-ons to open these files. Use the "plugin.disable_full_page_plugin_for_types" preference to set and lock the following extensions so that an external application, rather than an add-on or plugin, will not be used: PDF, FDF, XFDF, LSL, LSO, LSS, IQY, RQY, XLK, XLS, XLT, POT, PPS, PPT, DOS, DOT, WKS, BAT, PS, EPS, WCH, WCM, WB1, WB3, RTF, DOC, MDB, MDE, WBK, WB1, WCH, WCM, AD, ADP.

b
Firefox formfill assistance option is disabled.
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTBF140
Vuln IDs
V-15774
Rule IDs
SV-16713r2_rule
In order to protect privacy and sensitive data, Firefox provides the ability to configure Firefox such that data entered into forms is not saved. This mitigates the risk of a website gleaning private information from prefilled information.System Administrator
Fix: F-15991r2_fix

Ensure the preference “browser.formfill.enable" is set and locked to the value of “false”.

b
Firefox is configured to autofill passwords.
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTBF150
Vuln IDs
V-15775
Rule IDs
SV-16714r3_rule
While on the internet, it may be possible for an attacker to view the saved password files and gain access to the user's accounts on various hosts. System Administrator
Fix: F-15992r3_fix

Ensure the preference "signon.autofillForms" is set and locked to the value of “false”.

b
FireFox is configured to use a password store with or without a master password.
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTBF160
Vuln IDs
V-15776
Rule IDs
SV-16715r2_rule
Firefox can be set to store passwords for sites visited by the user. These individual passwords are stored in a file and can be protected by a master password. Autofill of the password can then be enabled when the site is visited. This feature could also be used to autofill the certificate pin which could lead to compromise of DoD information.System Administrator
Fix: F-15993r2_fix

Ensure the preference “signon.rememberSignons“ is set and locked to the value of “false”.

b
FireFox is not configured to block pop-up windows.
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTBF180
Vuln IDs
V-15778
Rule IDs
SV-16717r1_rule
Popup windows may be used to launch an attack within a new browser window with altered settings. This setting blocks popup windows created while the page is loading.System Administrator
Fix: F-15995r1_fix

Ensure the preference "dom.disable_window_open_feature.status " is set and locked to the value of “true”.

b
FireFox is configured to allow JavaScript to move or resize windows.
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTBF181
Vuln IDs
V-15779
Rule IDs
SV-16718r1_rule
JavaScript can make changes to the browser’s appearance. This activity can help disguise an attack taking place in a minimized background window. Set browser setting to prevent scripts on visited websites from moving and resizing browser windows. System Administrator
Fix: F-15996r1_fix

Ensure the preference "dom.disable_window_move_resize" is set and locked to the value of “true”.

b
Firefox must be configured to allow only TLS.
RMF Control
SC-13
Severity
Medium
CCI
CCI-002450
Version
DTBF030
Vuln IDs
V-15983
Rule IDs
SV-16925r8_rule
Use of versions prior to TLS 1.1 are not permitted. SSL 2.0 and SSL 3.0 contain a number of security flaws. These versions must be disabled in compliance with the Network Infrastructure and Secure Remote Computing STIGs.System Administrator
Fix: F-15984r8_fix

Configure the following parameters using the Mozilla.cfg file: LockPref "security.tls.version.min" is set to "2". LockPref "security.tls.version.max" is set to "4".

b
Firefox is configured to allow JavaScript to raise or lower windows.
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTBF182
Vuln IDs
V-15985
Rule IDs
SV-16927r1_rule
JavaScript can make changes to the browser’s appearance. Allowing a website to use JavaScript to raise and lower browser windows may disguise an attack. Browser windows may not be set as active via JavaScript. System Administrator
Fix: F-15997r1_fix

Ensure the preference "dom.disable_window_flip" is set and locked to the value of “true”.

b
Firefox is configured to allow JavaScript to disable or replace context menus.
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTBF183
Vuln IDs
V-15986
Rule IDs
SV-16928r2_rule
A context menu (also known as a pop-up menu) is often used in a graphical user interface (GUI) and appears upon user interaction (e.g., a right mouse click). A context menu offers a limited set of choices that are available in the current state, or context, of the operating system or application. A website may execute JavaScript that can make changes to these context menus. This can help disguise an attack. Set this preference to "false" so that webpages will not be able to affect the context menu event.System Administrator
Fix: F-15998r4_fix

Ensure the preferences "dom.event.contextmenu.enabled" is set and locked to "false".

b
Firefox automatically updates installed add-ons and plugins.
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTBF090
Vuln IDs
V-19742
Rule IDs
SV-59603r1_rule
Set this to false to disable checking for updated versions of the Extensions/Themes. Automatic updates from untrusted sites puts the enclave at risk of attack and may override security settings.System Administrator
Fix: F-20415r2_fix

Set the preference “extensions.update.enabled” value to "false" and lock using the Mozilla.cfg file.

b
Firefox required security preferences cannot be changed by user.
RMF Control
CM-6
Severity
Medium
CCI
CCI-000366
Version
DTBF070
Vuln IDs
V-19743
Rule IDs
SV-21889r9_rule
Locked settings prevent users from accessing about:config and changing the security settings set by the system administrator. Locked settings should be placed in the mozilla.cfg file. The mozilla.cfg file is an encoded file of JavaScript commands. The encoding is a simple "byte-shifting" with an offset of 13 (Netscape 4 used a similar encoding, but with a 7 instead). This file also needs to be "called" from the configuration file local-settings.jsSystem Administrator
Fix: F-22495r7_fix

Ensure the required settings in "about:config" are locked using the "mozilla.cfg" file.

b
Firefox automatically checks for updated version of installed Search plugins.
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTBF085
Vuln IDs
V-19744
Rule IDs
SV-21890r1_rule
Updates need to be controlled and installed from authorized and trusted servers. This setting overrides a number of other settings which may direct the application to access external URLs.System AdministratorECSC-1
Fix: F-20416r2_fix

Ensure the preference "browser.search.update" is set and locked to the value of “False”.

b
Extensions install must be disabled.
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTBF186
Vuln IDs
V-64891
Rule IDs
SV-79381r3_rule
A browser extension is a program that has been installed into the browser which adds functionality to it. Where a plug-in interacts only with a web page and usually a third party external application (Flash, Adobe Reader) an extension interacts with the browser program itself. Extensions are not embedded in web pages and must be downloaded and installed in order to work. Extensions allow browsers to avoid restrictions which apply to web pages. For example, an extension can be written to combine data from multiple domains and present it when a certain page is accessed which can be considered Cross Site Scripting. If a browser is configured to allow unrestricted use of extension then plug-ins can be loaded and installed from malicious sources and used on the browser.System Administrator
Fix: F-70831r2_fix

Set the preference “xpinstall.enabled” to “false” and lock using the “mozilla.cfg” file. The “mozilla.cfg” file may need to be created if it does not already exist.

b
Background submission of information to Mozilla must be disabled.
RMF Control
CM-7
Severity
Medium
CCI
CCI-000381
Version
DTBF190
Vuln IDs
V-79053
Rule IDs
SV-93759r3_rule
There should be no background submission of technical and other information from DoD computers to Mozilla with portions posted publically.
Fix: F-85803r3_fix

Ensure the preferences "datareporting.policy.dataSubmissionEnabled" is set and locked to "false".