Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-11761

Опубликовано: 08 янв. 2020
Источник: debian
EPSS Низкий

Описание

By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed70.0-1package
firefox-esrfixed68.2.0esr-1package
thunderbirdfixed1:68.2.1-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-33/#CVE-2019-11761

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-34/#CVE-2019-11761

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-35/#CVE-2019-11761

EPSS

Процентиль: 61%
0.00414
Низкий

Связанные уязвимости

CVSS3: 5.4
ubuntu
больше 5 лет назад

By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.

CVSS3: 5.4
redhat
больше 5 лет назад

By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.

CVSS3: 5.4
nvd
больше 5 лет назад

By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.

CVSS3: 5.4
github
около 3 лет назад

By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.

CVSS3: 5.4
fstec
больше 5 лет назад

Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой получения доступа к привилегированному объекту JSONView, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность

EPSS

Процентиль: 61%
0.00414
Низкий