Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-6823

Опубликовано: 10 апр. 2020
Источник: redhat
CVSS3: 9.8

Описание

A malicious extension could have called browser.identity.launchWebAuthFlow, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5firefoxWill not fix
Red Hat Enterprise Linux 6firefoxWill not fix
Red Hat Enterprise Linux 7firefoxWill not fix
Red Hat Enterprise Linux 8firefoxWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-358
https://bugzilla.redhat.com/show_bug.cgi?id=1821693Mozilla: Malicious Extension could obtain auth codes from OAuth login flows

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 6 лет назад

A malicious extension could have called <code>browser.identity.launchWebAuthFlow</code>, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75.

CVSS3: 9.8
nvd
почти 6 лет назад

A malicious extension could have called <code>browser.identity.launchWebAuthFlow</code>, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75.

CVSS3: 9.8
debian
почти 6 лет назад

A malicious extension could have called <code>browser.identity.launchW ...

CVSS3: 9.8
github
больше 3 лет назад

A malicious extension could have called <code>browser.identity.launchWebAuthFlow</code>, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75.

9.8 Critical

CVSS3

Уязвимость CVE-2020-6823