Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-6823

Опубликовано: 24 апр. 2020
Источник: debian
EPSS Низкий

Описание

A malicious extension could have called <code>browser.identity.launchWebAuthFlow</code>, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed75.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2020-12/#CVE-2020-6823

EPSS

Процентиль: 76%
0.00919
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 6 лет назад

A malicious extension could have called <code>browser.identity.launchWebAuthFlow</code>, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75.

CVSS3: 9.8
redhat
почти 6 лет назад

A malicious extension could have called <code>browser.identity.launchWebAuthFlow</code>, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75.

CVSS3: 9.8
nvd
почти 6 лет назад

A malicious extension could have called <code>browser.identity.launchWebAuthFlow</code>, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75.

CVSS3: 9.8
github
больше 3 лет назад

A malicious extension could have called <code>browser.identity.launchWebAuthFlow</code>, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75.

EPSS

Процентиль: 76%
0.00919
Низкий