Уязвимость утечки информации через атаку с использованием тайминга JavaScript Map/Set в Mozilla Firefox и Thunderbird
Описание
Злоумышленник способен использовать атаку с использованием тайминга JavaScript Map/Set, чтобы определить, используется ли атом в другом контейнере или зоне в определенных контекстах. Это может быть использовано для утечки информации, такой как имена пользователей, встроенные в JavaScript-код, между сайтами.
Затронутые версии ПО
- Firefox версии ниже 50.1
- Firefox ESR версии ниже 45.6
- Thunderbird версии ниже 45.6
Тип уязвимости
Утечка информации
Ссылки
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Issue TrackingPatch
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Issue TrackingPatch
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Одно из
Одно из
EPSS
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
Связанные уязвимости
An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
An attacker could use a JavaScript Map/Set timing attack to determine ...
An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
EPSS
7.5 High
CVSS3
5 Medium
CVSS2