Vulnerability Name: | CVE-2018-12399 (CCN-151898) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-10-23 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2018-10-23 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2019-03-01 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 4.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) 3.8 Low (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-287 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-12399 Source: BID Type: Third Party Advisory, VDB Entry 105721 Source: CCN Type: BID-105721 Mozilla Firefox Multiple Security Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1041944 Source: CONFIRM Type: Issue Tracking, Permissions Required, Vendor Advisory https://bugzilla.mozilla.org/show_bug.cgi?id=1490276 Source: XF Type: UNKNOWN firefox-cve201812399-spoofing(151898) Source: UBUNTU Type: Third Party Advisory USN-3801-1 Source: CCN Type: Mozilla Foundation Security Advisory 2018-26 Security vulnerabilities fixed in Firefox 63 Source: CONFIRM Type: Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-26/ Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-12399 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |