CVE-2019-11701Cross-site Scripting in Mozilla Firefox

CWE-79Cross-site Scripting10 documents5 sources
Severity
6.1MEDIUMNVD
OSV9.8
EPSS
0.2%
top 53.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 23
Latest updateMay 24

Description

The default webcal: protocol handler will load a web site vulnerable to cross-site scripting (XSS) attacks. This default was left in place as a legacy feature and has now been removed. *Note: this issue only affects users with an account on the vulnerable service. Other users are unaffected.*. This vulnerability affects Firefox < 67.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages4 packages

debiandebian/firefox< firefox 67.0-2 (sid)
CVEListV5mozilla/firefoxunspecified67
NVDmozilla/firefox< 67.0
Ubuntumozilla/firefox< 67.0+build2-0ubuntu0.16.04.1+5

🔴Vulnerability Details

5
GHSA
GHSA-frqr-7x7p-q8jj: The default webcal: protocol handler will load a web site vulnerable to cross-site scripting (XSS) attacks2022-05-24
OSV
firefox regression2019-06-14
OSV
firefox regression2019-06-06
OSV
firefox vulnerabilities2019-05-21
OSV
CVE-2019-11701: The default webcal: protocol handler will load a web site vulnerable to cross-site scripting (XSS) attacks2019-05-21

📋Vendor Advisories

4
Ubuntu
Firefox regression2019-06-14
Ubuntu
Firefox regression2019-06-06
Ubuntu
Firefox vulnerabilities2019-05-21
Debian
CVE-2019-11701: firefox - The default webcal: protocol handler will load a web site vulnerable to cross-si...2019