Уязвимость утечки информации через SVG фильтры в Mozilla Firefox и Thunderbird
Описание
Использование SVG фильтров, которые не используют математическую реализацию фиксированной точности на целевом iframe, позволяет злоумышленнику извлекать значения пикселей с целевой страницы. Это может использоваться для извлечения информации об истории посещения и чтения текстовых значений между доменами. Данное нарушает политику одного происхождения и ведет к утечке информации.
Затронутые версии ПО
- Firefox версий ниже 52
- Firefox ESR версий ниже 45.8
- Thunderbird версий ниже 52
- Thunderbird версий ниже 45.8
Тип уязвимости
- Утечка информации
- Нарушение политики одного происхождения
Ссылки
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- ExploitIssue TrackingVendor Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- ExploitIssue TrackingVendor Advisory
Уязвимые конфигурации
Одно из
EPSS
6.5 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
Using SVG filters that don't use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
Using SVG filters that don't use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
Using SVG filters that don't use the fixed point math implementation o ...
Using SVG filters that don't use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
EPSS
6.5 Medium
CVSS3
4.3 Medium
CVSS2