A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1667113 | Issue Tracking Permissions Required Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2020-50/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2020-51/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2020-52/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-12-09 01:15
Updated : 2020-12-09 19:49
NVD link : CVE-2020-26951
Mitre link : CVE-2020-26951
CVE.ORG link : CVE-2020-26951
JSON object : View
Products Affected
mozilla
- thunderbird
- firefox
- firefox_esr
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')