CVE-2021-38506

Through a series of navigations, Firefox could have entered fullscreen mode without notification or warning to the user. This could lead to spoofing attacks on the browser UI including phishing. This vulnerability affects Firefox < 94, Thunderbird < 91.3, and Firefox ESR < 91.3.
References
Link Resource
https://bugzilla.mozilla.org/show_bug.cgi?id=1730750 Issue Tracking Permissions Required Vendor Advisory
https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202202-03 Third Party Advisory
https://security.gentoo.org/glsa/202208-14 Third Party Advisory
https://www.debian.org/security/2021/dsa-5026 Third Party Advisory
https://www.debian.org/security/2022/dsa-5034 Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2021-48/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2021-49/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2021-50/ Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1730750 Issue Tracking Permissions Required Vendor Advisory
https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html Mailing List Third Party Advisory
https://security.gentoo.org/glsa/202202-03 Third Party Advisory
https://security.gentoo.org/glsa/202208-14 Third Party Advisory
https://www.debian.org/security/2021/dsa-5026 Third Party Advisory
https://www.debian.org/security/2022/dsa-5034 Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2021-48/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2021-49/ Vendor Advisory
https://www.mozilla.org/security/advisories/mfsa2021-50/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:17

Type Values Removed Values Added
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1730750 - Issue Tracking, Permissions Required, Vendor Advisory () https://bugzilla.mozilla.org/show_bug.cgi?id=1730750 - Issue Tracking, Permissions Required, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/12/msg00030.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2022/01/msg00001.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202202-03 - Third Party Advisory () https://security.gentoo.org/glsa/202202-03 - Third Party Advisory
References () https://security.gentoo.org/glsa/202208-14 - Third Party Advisory () https://security.gentoo.org/glsa/202208-14 - Third Party Advisory
References () https://www.debian.org/security/2021/dsa-5026 - Third Party Advisory () https://www.debian.org/security/2021/dsa-5026 - Third Party Advisory
References () https://www.debian.org/security/2022/dsa-5034 - Third Party Advisory () https://www.debian.org/security/2022/dsa-5034 - Third Party Advisory
References () https://www.mozilla.org/security/advisories/mfsa2021-48/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2021-48/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2021-49/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2021-49/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2021-50/ - Vendor Advisory () https://www.mozilla.org/security/advisories/mfsa2021-50/ - Vendor Advisory

Information

Published : 2021-12-08 22:15

Updated : 2024-11-21 06:17


NVD link : CVE-2021-38506

Mitre link : CVE-2021-38506

CVE.ORG link : CVE-2021-38506


JSON object : View

Products Affected

mozilla

  • firefox
  • thunderbird
  • firefox_esr

debian

  • debian_linux
CWE
CWE-1021

Improper Restriction of Rendered UI Layers or Frames