fkie_cve-2020-6798
Vulnerability from fkie_nvd
Published
2020-03-02 05:15
Modified
2024-11-21 05:36
Severity ?
Summary
If a template tag was used in a select tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability as a result. In general, this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but is potentially a risk in browser or browser-like contexts. This vulnerability affects Thunderbird < 68.5, Firefox < 73, and Firefox < ESR68.5.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
mozilla | firefox | * | |
mozilla | firefox_esr | * | |
mozilla | thunderbird | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", matchCriteriaId: "D881BDA7-3601-4A45-991F-4B2B187A73D0", versionEndExcluding: "73.0", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", matchCriteriaId: "17B5BB4D-FF9F-433C-A3AC-E4F34C3D75D9", versionEndExcluding: "68.5.0", vulnerable: true, }, { criteria: "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", matchCriteriaId: "BED2E060-4B8C-403F-B1E9-D45E2511D1CA", versionEndExcluding: "68.5.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "If a template tag was used in a select tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability as a result. In general, this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but is potentially a risk in browser or browser-like contexts. This vulnerability affects Thunderbird < 68.5, Firefox < 73, and Firefox < ESR68.5.", }, { lang: "es", value: "Si se usó una etiqueta template en una etiqueta select, el analizador podría ser confundido y permitir el análisis y la ejecución de JavaScript cuando no debería ser permitido. Un sitio que se basó en que el navegador se comportara correctamente podría sufrir una vulnerabilidad de tipo cross-site scripting como resultado de ello. En general, este fallo no puede ser explotado por medio del correo electrónico en el producto Thunderbird porque el scripting es deshabilitado cuando se lee el correo, pero es potencialmente un riesgo en el navegador o en contextos similares a los del navegador. Esta vulnerabilidad afecta a Thunderbird versiones anteriores a 68.5, Firefox versiones anteriores a 73, y Firefox versiones anteriores a ESR68.5.", }, ], id: "CVE-2020-6798", lastModified: "2024-11-21T05:36:12.143", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2020-03-02T05:15:13.400", references: [ { source: "security@mozilla.org", tags: [ "Permissions Required", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1602944", }, { source: "security@mozilla.org", url: "https://security.gentoo.org/glsa/202003-02", }, { source: "security@mozilla.org", url: "https://security.gentoo.org/glsa/202003-10", }, { source: "security@mozilla.org", url: "https://usn.ubuntu.com/4278-2/", }, { source: "security@mozilla.org", url: "https://usn.ubuntu.com/4328-1/", }, { source: "security@mozilla.org", url: "https://usn.ubuntu.com/4335-1/", }, { source: "security@mozilla.org", tags: [ "Vendor Advisory", ], url: "https://www.mozilla.org/security/advisories/mfsa2020-05/", }, { source: "security@mozilla.org", tags: [ "Vendor Advisory", ], url: "https://www.mozilla.org/security/advisories/mfsa2020-06/", }, { source: "security@mozilla.org", tags: [ "Vendor Advisory", ], url: "https://www.mozilla.org/security/advisories/mfsa2020-07/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", ], url: "https://bugzilla.mozilla.org/show_bug.cgi?id=1602944", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/202003-02", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/202003-10", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/4278-2/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/4328-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://usn.ubuntu.com/4335-1/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.mozilla.org/security/advisories/mfsa2020-05/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.mozilla.org/security/advisories/mfsa2020-06/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.mozilla.org/security/advisories/mfsa2020-07/", }, ], sourceIdentifier: "security@mozilla.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-79", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.