If an attacker needed a user to load an insecure http: page and knew that user had enabled HTTPS-only mode, the attacker could have tricked the user into clicking to grant an HTTPS-only exception if they could get the user to participate in a clicking game. This vulnerability affects Firefox < 120.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1850200 | Issue Tracking Permissions Required |
https://security.gentoo.org/glsa/202401-10 | |
https://www.mozilla.org/security/advisories/mfsa2023-49/ | Release Notes Vendor Advisory |
Configurations
History
28 Nov 2023, 19:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.mozilla.org/security/advisories/mfsa2023-49/ - Release Notes, Vendor Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1850200 - Issue Tracking, Permissions Required | |
CWE | CWE-1021 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CPE | cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* |
21 Nov 2023, 16:30
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-21 15:15
Updated : 2024-02-05 00:22
NVD link : CVE-2023-6211
Mitre link : CVE-2023-6211
CVE.ORG link : CVE-2023-6211
JSON object : View
Products Affected
mozilla
- firefox
CWE
CWE-1021
Improper Restriction of Rendered UI Layers or Frames