CVE-2019-11738

If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

History

31 Mar 2022, 18:07

Type Values Removed Values Added
CWE CWE-276 NVD-CWE-noinfo
CPE cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html - Mailing List, Third Party Advisory
References (MISC) https://bugzilla.mozilla.org/show_bug.cgi?id=1452037 - Issue Tracking, Permissions Required, Vendor Advisory (MISC) https://bugzilla.mozilla.org/show_bug.cgi?id=1452037 - Exploit, Issue Tracking, Vendor Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html - (SUSE) http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html - Mailing List, Third Party Advisory

Information

Published : 2019-09-27 18:15

Updated : 2024-02-04 20:39


NVD link : CVE-2019-11738

Mitre link : CVE-2019-11738

CVE.ORG link : CVE-2019-11738


JSON object : View

Products Affected

mozilla

  • firefox
  • firefox_esr

opensuse

  • leap