CVE-2023-23603Allocation of Resources Without Limits or Throttling in Mozilla Firefox

Severity
6.5MEDIUMNVD
EPSS
0.2%
top 61.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 2

Description

Regular expressions used to filter out forbidden properties and values from style directives in calls to `console.log` weren't accounting for external URLs. Data could then be potentially exfiltrated from the browser. This vulnerability affects Firefox < 109, Firefox ESR < 102.7, and Thunderbird < 102.7.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages9 packages

CVEListV5mozilla/firefoxunspecified109
NVDmozilla/firefox< 109.0
CVEListV5mozilla/firefox_esrunspecified102.7
NVDmozilla/firefox_esr< 102.7
Ubuntumozilla/firefox< 109.0.1+build1-0ubuntu0.18.04.2+3

🔴Vulnerability Details

6
OSV
CVE-2023-23603: Regular expressions used to filter out forbidden properties and values from style directives in calls to `console2023-06-02
GHSA
GHSA-3r46-584r-xx8v: Regular expressions used to filter out forbidden properties and values from style directives in calls to console2023-06-02
CVEList
Calls to console.log allowed bypassing Content Security Policy via format directive2023-06-02
OSV
firefox regressions2023-02-06
OSV
thunderbird vulnerabilities2023-02-06

📋Vendor Advisories

8
Ubuntu
Thunderbird vulnerabilities2023-02-06
Ubuntu
Firefox regressions2023-02-06
Ubuntu
Firefox vulnerabilities2023-01-23
Red Hat
Mozilla: Calls to <code>console.log</code> allowed bypasing Content Security Policy via format directive2023-01-17
Debian
CVE-2023-23603: firefox - Regular expressions used to filter out forbidden properties and values from styl...2023
CVE-2023-23603 — Mozilla Firefox vulnerability | cvebase