In Reader View SameSite cookie protections are not checked on exiting. This allows for a payload to be triggered when Reader View is exited if loaded by a malicious site while Reader mode is active, bypassing CSRF protections. This vulnerability affects Firefox < 61.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1041193 | Third Party Advisory VDB Entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=1456652 | Issue Tracking Patch Vendor Advisory |
https://security.gentoo.org/glsa/201810-01 | Third Party Advisory |
https://usn.ubuntu.com/3705-1/ | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2018-15/ | Vendor Advisory |
http://www.securitytracker.com/id/1041193 | Third Party Advisory VDB Entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=1456652 | Issue Tracking Patch Vendor Advisory |
https://security.gentoo.org/glsa/201810-01 | Third Party Advisory |
https://usn.ubuntu.com/3705-1/ | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2018-15/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:45
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securitytracker.com/id/1041193 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1456652 - Issue Tracking, Patch, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/201810-01 - Third Party Advisory | |
References | () https://usn.ubuntu.com/3705-1/ - Third Party Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2018-15/ - Vendor Advisory |
Information
Published : 2018-10-18 13:29
Updated : 2024-11-21 03:45
NVD link : CVE-2018-12370
Mitre link : CVE-2018-12370
CVE.ORG link : CVE-2018-12370
JSON object : View
Products Affected
canonical
- ubuntu_linux
mozilla
- firefox
CWE
CWE-352
Cross-Site Request Forgery (CSRF)