Описание
By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.
A vulnerability was found in Mozilla Firefox and Thunderbird. Privileged JSONView objects that have been cloned into content can be accessed using a form with a data URI. This flaw bypasses existing defense-in-depth mechanisms and can be exploited over the network.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | firefox | Out of support scope | ||
Red Hat Enterprise Linux 5 | thunderbird | Out of support scope | ||
Red Hat Enterprise Linux 6 | firefox | Fixed | RHSA-2019:3281 | 31.10.2019 |
Red Hat Enterprise Linux 6 | thunderbird | Fixed | RHSA-2019:3756 | 06.11.2019 |
Red Hat Enterprise Linux 7 | firefox | Fixed | RHSA-2019:3193 | 24.10.2019 |
Red Hat Enterprise Linux 7 | thunderbird | Fixed | RHSA-2019:3210 | 29.10.2019 |
Red Hat Enterprise Linux 8 | firefox | Fixed | RHSA-2019:3196 | 24.10.2019 |
Red Hat Enterprise Linux 8 | thunderbird | Fixed | RHSA-2019:3237 | 29.10.2019 |
Показывать по
Дополнительная информация
Статус:
5.4 Medium
CVSS3
Связанные уязвимости
By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.
By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.
By using a form with a data URI it was possible to gain access to the ...
By using a form with a data URI it was possible to gain access to the privileged JSONView object that had been cloned into content. Impact from exposing this object appears to be minimal, however it was a bypass of existing defense in depth mechanisms. This vulnerability affects Firefox < 70, Thunderbird < 68.2, and Firefox ESR < 68.2.
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой получения доступа к привилегированному объекту JSONView, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
5.4 Medium
CVSS3