Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-12424

Опубликовано: 30 июн. 2020
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This vulnerability affects Firefox < 78.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5firefoxOut of support scope
Red Hat Enterprise Linux 6firefoxWill not fix
Red Hat Enterprise Linux 7firefoxFixedRHSA-2020:408030.09.2020
Red Hat Enterprise Linux 8firefoxFixedRHSA-2020:355726.08.2020
Red Hat Enterprise Linux 8.0 Update Services for SAP SolutionsfirefoxFixedRHSA-2020:355526.08.2020
Red Hat Enterprise Linux 8.1 Extended Update SupportfirefoxFixedRHSA-2020:355926.08.2020

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-451
https://bugzilla.redhat.com/show_bug.cgi?id=1872539Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process

EPSS

Процентиль: 37%
0.0016
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 5 лет назад

When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This vulnerability affects Firefox < 78.

CVSS3: 6.5
nvd
около 5 лет назад

When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This vulnerability affects Firefox < 78.

CVSS3: 6.5
debian
около 5 лет назад

When constructing a permission prompt for WebRTC, a URI was supplied f ...

CVSS3: 6.5
github
около 3 лет назад

When constructing a permission prompt for WebRTC, a URI was supplied from the content process. This URI was untrusted, and could have been the URI of an origin that was previously granted permission; bypassing the prompt. This vulnerability affects Firefox < 78.

CVSS3: 6.5
fstec
около 5 лет назад

Уязвимость браузера Mozilla Firefox и почтового клиента Thunderbird, связанная с неправильными настройками прав доступа по умолчанию, позволяющая нарушителю обойти существующие ограничения безопасности

EPSS

Процентиль: 37%
0.0016
Низкий

6.5 Medium

CVSS3