CVE-2019-11738

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

21 Nov 2024, 04:21

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html - Mailing List, Third Party Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1452037 - Exploit, Issue Tracking, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=1452037 - Exploit, Issue Tracking, Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2019-25/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2019-25/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2019-26/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2019-26/ - Vendor Advisory

Information

Published : 2019-09-27 18:15

Updated : 2024-11-21 04:21


NVD link : CVE-2019-11738

Mitre link : CVE-2019-11738

CVE.ORG link : CVE-2019-11738


JSON object : View

Products Affected

opensuse

  • leap

mozilla

  • firefox
  • firefox_esr