Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-23972

Опубликовано: 26 фев. 2021
Источник: debian
EPSS Низкий

Описание

One phishing tactic on the web is to provide a link with HTTP Auth. For example 'https://www.phishingtarget.com@evil.com'. To mitigate this type of attack, Firefox will display a warning dialog; however, this warning dialog would not have been displayed if evil.com used a redirect that was cached by the browser. This vulnerability affects Firefox < 86.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed86.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2021-07/#CVE-2021-23972

EPSS

Процентиль: 64%
0.00467
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 5 лет назад

One phishing tactic on the web is to provide a link with HTTP Auth. For example 'https://www.phishingtarget.com@evil.com'. To mitigate this type of attack, Firefox will display a warning dialog; however, this warning dialog would not have been displayed if evil.com used a redirect that was cached by the browser. This vulnerability affects Firefox < 86.

CVSS3: 8.8
nvd
почти 5 лет назад

One phishing tactic on the web is to provide a link with HTTP Auth. For example 'https://www.phishingtarget.com@evil.com'. To mitigate this type of attack, Firefox will display a warning dialog; however, this warning dialog would not have been displayed if evil.com used a redirect that was cached by the browser. This vulnerability affects Firefox < 86.

CVSS3: 8.8
github
больше 3 лет назад

One phishing tactic on the web is to provide a link with HTTP Auth. For example 'https://www.phishingtarget.com@evil.com'. To mitigate this type of attack, Firefox will display a warning dialog; however, this warning dialog would not have been displayed if evil.com used a redirect that was cached by the browser. This vulnerability affects Firefox < 86.

EPSS

Процентиль: 64%
0.00467
Низкий
Уязвимость CVE-2021-23972