CVE-2019-11738 log
| Source |
|
| Severity | Low |
| Remote | Yes |
| Type | Access restriction bypass |
| Description | In Firefox before 69.0, if a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. |
| Group | Package | Affected | Fixed | Severity | Status | Ticket |
|---|---|---|---|---|---|---|
| AVG-1036 | firefox | 68.0.2-1 | 69.0-1 | High | Fixed |
| Date | Advisory | Group | Package | Severity | Type |
|---|---|---|---|---|---|
| 04 Sep 2019 | ASA-201909-2 | AVG-1036 | firefox | High | multiple issues |
| References |
|---|
https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/#CVE-2019-11738 https://bugzilla.mozilla.org/show_bug.cgi?id=1452037 |