Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-11738

Опубликовано: 27 сент. 2019
Источник: debian
EPSS Низкий

Описание

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed69.0-1package
firefox-esrfixed68.1.0esr-1package
firefox-esrnot-affectedbusterpackage
firefox-esrnot-affectedstretchpackage
firefox-esrnot-affectedjessiepackage

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/#CVE-2019-11738

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-26/#CVE-2019-11738

EPSS

Процентиль: 68%
0.00585
Низкий

Связанные уязвимости

CVSS3: 6.3
ubuntu
около 6 лет назад

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.

CVSS3: 5.8
redhat
около 6 лет назад

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.

CVSS3: 6.3
nvd
около 6 лет назад

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.

CVSS3: 6.3
github
больше 3 лет назад

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.

CVSS3: 8.8
fstec
около 6 лет назад

Уязвимость браузера Firefox, связанная с неправильными стандартными правами доступа, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 68%
0.00585
Низкий