Cross-site Scripting (XSS) Affecting firefox package, versions <68.0-1
Snyk CVSS
Attack Complexity
Low
User Interaction
Required
Scope
Changed
Threat Intelligence
EPSS
0.46% (75th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-FIREFOX-453763
- published 24 Jul 2019
- disclosed 23 Jul 2019
Introduced: 23 Jul 2019
CVE-2019-11720 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
firefox
to version 68.0-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream firefox
package and not the firefox
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox < 68.
References
- https://security-tracker.debian.org/tracker/CVE-2019-11720
- https://security.gentoo.org/glsa/201908-12
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1556230
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2019-11720