CVE-2020-15680Mozilla Firefox vulnerability

11 documents8 sources
Severity
5.3MEDIUMNVD
EPSS
0.3%
top 44.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 22
Latest updateMar 5

Description

If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. This vulnerability affects Firefox < 82.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages5 packages

debiandebian/firefox< firefox 82.0-1 (sid)
CVEListV5mozilla/firefoxunspecified82
NVDmozilla/firefox< 82.0
Ubuntumozilla/firefox< 82.0+build2-0ubuntu0.16.04.5+2
mozillamozilla/firefox

🔴Vulnerability Details

2
GHSA
GHSA-rcq3-vgfc-jm9v: If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size o2022-05-24
OSV
CVE-2020-15680: If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size o2020-10-22

📋Vendor Advisories

4
Ubuntu
Firefox vulnerabilities2020-10-26
Ubuntu
Firefox vulnerabilities2020-10-23
Debian
CVE-2020-15680: firefox - If a valid external protocol handler was referenced in an image tag, the resulti...2020
Mozilla
Mozilla Foundation Security Advisory 2020-45: CVE-2020-15680

🕵️Threat Intelligence

1
Fortinet
Leaking Browser URL/Protocol Handlers | FortiGuard Labs2020-12-03

💬Community

3
Bugzilla
Leaking Browser URL/Protocol Handlers by img onerror loading time2024-03-05
Bugzilla
Leaking Browser URL/Protocol Handlers by CSP report-uri2024-02-27
Bugzilla
Leaking Browser URL/Protocol Handlers through window.open() behavior2024-02-20