CVE-2019-11738 log

Source
Severity Low
Remote Yes
Type Access restriction bypass
Description
In Firefox before 69.0, if a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions.
Group Package Affected Fixed Severity Status Ticket
AVG-1036 firefox 68.0.2-1 69.0-1 High Fixed
Date Advisory Group Package Severity Type
04 Sep 2019 ASA-201909-2 AVG-1036 firefox High multiple issues
References
https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/#CVE-2019-11738
https://bugzilla.mozilla.org/show_bug.cgi?id=1452037