Executive Summary

Informations
NameCVE-2019-11738First vendor Publication2019-09-27
VendorCveLast vendor Modification2019-10-05

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P)
Cvss Base Score6.8Attack RangeNetwork
Cvss Impact Score6.4Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11738

CWE : Common Weakness Enumeration

%idName
100 %CWE-276Incorrect Default Permissions

CPE : Common Platform Enumeration

TypeDescriptionCount
Application420
Application124

Sources (Detail)

SourceUrl
CONFIRM https://www.mozilla.org/security/advisories/mfsa2019-25/
https://www.mozilla.org/security/advisories/mfsa2019-26/
MISC https://bugzilla.mozilla.org/show_bug.cgi?id=1452037
SUSE http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2019-10-06 21:20:41
  • Multiple Updates
2019-10-05 12:11:01
  • Multiple Updates
2019-10-02 17:18:49
  • Multiple Updates
2019-09-28 12:10:54
  • First insertion