CVE-2019-11738 log
Source |
|
Severity | Low |
Remote | Yes |
Type | Access restriction bypass |
Description | In Firefox before 69.0, if a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-1036 | firefox | 68.0.2-1 | 69.0-1 | High | Fixed |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
04 Sep 2019 | ASA-201909-2 | AVG-1036 | firefox | High | multiple issues |
References |
---|
https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/#CVE-2019-11738 https://bugzilla.mozilla.org/show_bug.cgi?id=1452037 |