Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-29974

Опубликовано: 05 авг. 2021
Источник: debian
EPSS Низкий

Описание

When network partitioning was enabled, e.g. as a result of Enhanced Tracking Protection settings, a TLS error page would allow the user to override an error on a domain which had specified HTTP Strict Transport Security (which implies that the error should not be override-able.) This issue did not affect the network connections, and they were correctly upgraded to HTTPS automatically. This vulnerability affects Firefox < 90.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed90.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2021-28/#CVE-2021-29974

EPSS

Процентиль: 59%
0.00391
Низкий

Связанные уязвимости

CVSS3: 4.3
ubuntu
около 4 лет назад

When network partitioning was enabled, e.g. as a result of Enhanced Tracking Protection settings, a TLS error page would allow the user to override an error on a domain which had specified HTTP Strict Transport Security (which implies that the error should not be override-able.) This issue did not affect the network connections, and they were correctly upgraded to HTTPS automatically. This vulnerability affects Firefox < 90.

CVSS3: 4.3
nvd
около 4 лет назад

When network partitioning was enabled, e.g. as a result of Enhanced Tracking Protection settings, a TLS error page would allow the user to override an error on a domain which had specified HTTP Strict Transport Security (which implies that the error should not be override-able.) This issue did not affect the network connections, and they were correctly upgraded to HTTPS automatically. This vulnerability affects Firefox < 90.

CVSS3: 4.3
github
больше 3 лет назад

When network partitioning was enabled, e.g. as a result of Enhanced Tracking Protection settings, a TLS error page would allow the user to override an error on a domain which had specified HTTP Strict Transport Security (which implies that the error should not be override-able.) This issue did not affect the network connections, and they were correctly upgraded to HTTPS automatically. This vulnerability affects Firefox < 90.

CVSS3: 6.1
fstec
около 4 лет назад

Уязвимость реализации механизма HSTS (HTTP Strict Transport Security) браузера Mozilla Firefox, позволяющая нарушителю обойти механизмы защиты

EPSS

Процентиль: 59%
0.00391
Низкий