Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-11738

Опубликовано: 03 сент. 2019
Источник: redhat
CVSS3: 5.8
EPSS Низкий

Описание

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5firefoxOut of support scope
Red Hat Enterprise Linux 6firefoxNot affected
Red Hat Enterprise Linux 7firefoxNot affected
Red Hat Enterprise Linux 8firefoxFixedRHSA-2019:266304.09.2019

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-358
https://bugzilla.redhat.com/show_bug.cgi?id=1748663Mozilla: Content security policy bypass through hash-based sources in directives

EPSS

Процентиль: 68%
0.00585
Низкий

5.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.3
ubuntu
около 6 лет назад

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.

CVSS3: 6.3
nvd
около 6 лет назад

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.

CVSS3: 6.3
debian
около 6 лет назад

If a Content Security Policy (CSP) directive is defined that uses a ha ...

CVSS3: 6.3
github
больше 3 лет назад

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.

CVSS3: 8.8
fstec
около 6 лет назад

Уязвимость браузера Firefox, связанная с неправильными стандартными правами доступа, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 68%
0.00585
Низкий

5.8 Medium

CVSS3