Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-15677

Опубликовано: 22 сент. 2020
Источник: redhat
CVSS3: 6.1
EPSS Низкий

Описание

By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.

The Mozilla Foundation Security Advisory describes this flaw as: By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5firefoxOut of support scope
Red Hat Enterprise Linux 5thunderbirdOut of support scope
Red Hat Enterprise Linux 6firefoxFixedRHSA-2020:383524.09.2020
Red Hat Enterprise Linux 6thunderbirdFixedRHSA-2020:415801.10.2020
Red Hat Enterprise Linux 7firefoxFixedRHSA-2020:408030.09.2020
Red Hat Enterprise Linux 7thunderbirdFixedRHSA-2020:416301.10.2020
Red Hat Enterprise Linux 8firefoxFixedRHSA-2020:383224.09.2020
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2020:415501.10.2020
Red Hat Enterprise Linux 8.0 Update Services for SAP SolutionsfirefoxFixedRHSA-2020:383424.09.2020
Red Hat Enterprise Linux 8.0 Update Services for SAP SolutionsthunderbirdFixedRHSA-2020:415601.10.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-601
https://bugzilla.redhat.com/show_bug.cgi?id=1881664Mozilla: Download origin spoofing via redirect

EPSS

Процентиль: 66%
0.00527
Низкий

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
ubuntu
почти 5 лет назад

By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.

CVSS3: 6.1
nvd
почти 5 лет назад

By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.

CVSS3: 6.1
debian
почти 5 лет назад

By exploiting an Open Redirect vulnerability on a website, an attacker ...

CVSS3: 6.1
github
больше 3 лет назад

By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from. This vulnerability affects Firefox < 81, Thunderbird < 78.3, and Firefox ESR < 78.3.

suse-cvrf
почти 5 лет назад

Security update for MozillaFirefox

EPSS

Процентиль: 66%
0.00527
Низкий

6.1 Medium

CVSS3