Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-38497

Опубликовано: 05 окт. 2021
Источник: redhat
CVSS3: 6.5

Описание

Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxOut of support scope
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7firefoxFixedRHSA-2021:379112.10.2021
Red Hat Enterprise Linux 7thunderbirdFixedRHSA-2021:384113.10.2021
Red Hat Enterprise Linux 8firefoxFixedRHSA-2021:375511.10.2021
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2021:383813.10.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportfirefoxFixedRHSA-2021:375711.10.2021
Red Hat Enterprise Linux 8.1 Extended Update SupportthunderbirdFixedRHSA-2021:384013.10.2021
Red Hat Enterprise Linux 8.2 Extended Update SupportfirefoxFixedRHSA-2021:375611.10.2021
Red Hat Enterprise Linux 8.2 Extended Update SupportthunderbirdFixedRHSA-2021:383913.10.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-1021
https://bugzilla.redhat.com/show_bug.cgi?id=2011098Mozilla: Validation message could have been overlaid on another origin

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 4 года назад

Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

CVSS3: 6.5
nvd
почти 4 года назад

Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

CVSS3: 6.5
debian
почти 4 года назад

Through use of reportValidity() and window.open(), a plain-text valida ...

github
около 3 лет назад

Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.

suse-cvrf
почти 4 года назад

Security update for MozillaFirefox

6.5 Medium

CVSS3