Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-26951

Опубликовано: 09 дек. 2020
Источник: debian
EPSS Низкий

Описание

A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed83.0-1package
firefox-esrfixed78.5.0esr-1package
thunderbirdfixed1:78.5.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2020-50/#CVE-2020-26951

  • https://www.mozilla.org/en-US/security/advisories/mfsa2020-51/#CVE-2020-26951

  • https://www.mozilla.org/en-US/security/advisories/mfsa2020-52/#CVE-2020-26951

EPSS

Процентиль: 62%
0.00433
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
около 5 лет назад

A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

CVSS3: 6.1
redhat
около 5 лет назад

A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

CVSS3: 6.1
nvd
около 5 лет назад

A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

github
больше 3 лет назад

A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.

CVSS3: 7.5
fstec
около 5 лет назад

Уязвимость синтаксического анализа и загрузки событий в коде SVG веб-браузера Firefox и почтового клиента Thunderbird, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)

EPSS

Процентиль: 62%
0.00433
Низкий