An object tag with a data URI did not correctly inherit the document's Content Security Policy. This allowed a CSP bypass in a cross-origin frame if the document's policy explicitly allowed data: URIs. This vulnerability affects Firefox < 70.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1441468 | Permissions Required |
https://www.mozilla.org/security/advisories/mfsa2019-34/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1441468 | Permissions Required |
https://www.mozilla.org/security/advisories/mfsa2019-34/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 04:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1441468 - Permissions Required | |
References | () https://www.mozilla.org/security/advisories/mfsa2019-34/ - Vendor Advisory |
Information
Published : 2020-01-08 21:15
Updated : 2024-11-21 04:31
NVD link : CVE-2019-17000
Mitre link : CVE-2019-17000
CVE.ORG link : CVE-2019-17000
JSON object : View
Products Affected
mozilla
- firefox
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')