CVE-2019-11738Incorrect Default Permissions in Mozilla Firefox

Severity
6.3MEDIUMNVD
OSV9.8
EPSS
0.6%
top 30.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 27
Latest updateMay 24

Description

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:LExploitability: 2.8 | Impact: 3.4

Affected Packages8 packages

debiandebian/firefox< firefox 69.0-1 (sid)
CVEListV5mozilla/firefoxunspecified69
NVDmozilla/firefox< 69.0
debiandebian/firefox-esr< firefox 69.0-1 (sid)
CVEListV5mozilla/firefox_esrunspecified68.1

🔴Vulnerability Details

4
GHSA
GHSA-v2rv-c5w8-f538: If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascrip2022-05-24
OSV
firefox regression2019-10-08
OSV
CVE-2019-11738: If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascrip2019-09-27
OSV
firefox vulnerabilities2019-09-04

📋Vendor Advisories

4
Ubuntu
Firefox regression2019-10-08
Ubuntu
Firefox vulnerabilities2019-09-04
Red Hat
Mozilla: Content security policy bypass through hash-based sources in directives2019-09-03
Debian
CVE-2019-11738: firefox - If a Content Security Policy (CSP) directive is defined that uses a hash-based s...2019

💬Community

2
Bugzilla
CVE-2019-11738 Mozilla: Content security policy bypass through hash-based sources in directives2019-09-04
Bugzilla
Firefox 69.0 is available2019-09-03
CVE-2019-11738 — Incorrect Default Permissions | cvebase