CVE-2020-6808Authentication Bypass by Spoofing in Mozilla Firefox

Severity
6.5MEDIUMNVD
EPSS
0.4%
top 42.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 25
Latest updateMay 24

Description

When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was the originating javascript: URL which could lead to spoofing attacks; it is now correctly the URL of the originating document. This vulnerability affects Firefox < 74.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages5 packages

debiandebian/firefox< firefox 74.0-1 (sid)
CVEListV5mozilla/firefoxunspecified74
NVDmozilla/firefox< 74.0
Ubuntumozilla/firefox< 74.0+build3-0ubuntu0.16.04.1+2
mozillamozilla/firefox

🔴Vulnerability Details

3
GHSA
GHSA-5c26-qqvr-j75w: When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented2022-05-24
OSV
firefox vulnerabilities2020-03-11
OSV
CVE-2020-6808: When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented2020-03-11

📋Vendor Advisories

4
Ubuntu
Firefox vulnerabilities2020-03-11
Red Hat
Mozilla: URL Spoofing via javascript: URL2020-03-10
Debian
CVE-2020-6808: firefox - When a JavaScript URL (javascript:) is evaluated and the result is a string, thi...2020
Mozilla
Mozilla Foundation Security Advisory 2020-08: CVE-2020-6808

💬Community

1
Bugzilla
CVE-2020-6808 Mozilla: URL Spoofing via javascript: URL2020-04-29