Severity
9.8CRITICALNVD
OSV7.5
EPSS
0.9%
top 24.02%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 24
Latest updateMay 24

Description

A malicious extension could have called browser.identity.launchWebAuthFlow, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages5 packages

debiandebian/firefox< firefox 75.0-1 (sid)
CVEListV5mozilla/firefoxunspecified75
NVDmozilla/firefox< 75.0
Ubuntumozilla/firefox< 75.0+build3-0ubuntu0.16.04.1+2
mozillamozilla/firefox

🔴Vulnerability Details

3
GHSA
GHSA-cm6f-xjjv-f446: A malicious extension could have called browser2022-05-24
OSV
CVE-2020-6823: A malicious extension could have called browser2020-04-07
OSV
firefox vulnerabilities2020-04-07

📋Vendor Advisories

4
Red Hat
Mozilla: Malicious Extension could obtain auth codes from OAuth login flows2020-04-10
Ubuntu
Firefox vulnerabilities2020-04-07
Debian
CVE-2020-6823: firefox - A malicious extension could have called <code>browser.identity.launchWebAuthFlow...2020
Mozilla
Mozilla Foundation Security Advisory 2020-12: CVE-2020-6823

💬Community

1
Bugzilla
CVE-2020-6823 Mozilla: Malicious Extension could obtain auth codes from OAuth login flows2020-04-07