Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-11694

Опубликовано: 26 нояб. 2024
Источник: debian
EPSS Низкий

Описание

Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Thunderbird < 115.18.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed133.0-1package
firefox-esrfixed128.5.0esr-1package
thunderbirdfixed1:128.5.0esr-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-63/#CVE-2024-11694

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-64/#CVE-2024-11694

  • https://www.mozilla.org/en-US/security/advisories/mfsa2024-68/#CVE-2024-11694

EPSS

Процентиль: 37%
0.00153
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
7 месяцев назад

Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Thunderbird < 115.18.

CVSS3: 6.1
redhat
7 месяцев назад

Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Thunderbird < 115.18.

CVSS3: 6.1
nvd
7 месяцев назад

Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Thunderbird < 115.18.

CVSS3: 6.1
github
7 месяцев назад

Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5.

CVSS3: 4.3
fstec
7 месяцев назад

Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю выполнить DOM Based XSS-атаку

EPSS

Процентиль: 37%
0.00153
Низкий