Уязвимость межсайтового скриптинга (XSS) через некорректное поведение директивы "sandbox" политики безопасности контента (CSP) в Mozilla Firefox и Thunderbird
Описание
Директива "sandbox" в политике безопасности контента (CSP) некорректно создаёт уникальное происхождение для документа, ведя себя так, как если бы всегда было указано ключевое слово "allow-same-origin". Это может привести к атаке межсайтового скриптинга (XSS) с использованием небезопасного содержимого.
Затронутые версии ПО
- Firefox версий до 56
- Firefox ESR версий до 52.4
- Thunderbird версий до 52.4
Тип уязвимости
Межсайтовый скриптинг (XSS)
Ссылки
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
- ExploitIssue TrackingPatch
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Vendor Advisory
- Vendor Advisory
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- Third Party Advisory
- Third Party Advisory
- ExploitIssue TrackingPatch
- Mailing ListThird Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Одно из
Одно из
Одно из
EPSS
5.4 Medium
CVSS3
4.3 Medium
CVSS2
Дефекты
Связанные уязвимости
The content security policy (CSP) "sandbox" directive did not create a unique origin for the document, causing it to behave as if the "allow-same-origin" keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
The content security policy (CSP) "sandbox" directive did not create a unique origin for the document, causing it to behave as if the "allow-same-origin" keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
The content security policy (CSP) "sandbox" directive did not create a ...
The content security policy (CSP) "sandbox" directive did not create a unique origin for the document, causing it to behave as if the "allow-same-origin" keyword were always specified. This could allow a Cross-Site Scripting (XSS) attack to be launched from unsafe content. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Уязвимость реализации механизма CSP браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
EPSS
5.4 Medium
CVSS3
4.3 Medium
CVSS2