Vulnerability Name: | CVE-2018-5143 (CCN-140256) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-03-13 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2018-03-13 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2018-08-02 | ||||||||||||||||||||||||||||||||||||||||
Summary: | URLs using "javascript:" have the protocol removed when pasted into the addressbar to protect users from cross-site scripting (XSS) attacks, but if a tab character is embedded in the "javascript:" URL the protocol is not removed and the script will execute. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Firefox < 59. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-79 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Cross-Site Scripting | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-5143 Source: BID Type: Third Party Advisory, VDB Entry 103386 Source: CCN Type: BID-103386 Mozilla Firefox MFSA2018-06 Multiple Security Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1040514 Source: CONFIRM Type: Issue Tracking, Vendor Advisory https://bugzilla.mozilla.org/show_bug.cgi?id=1422643 Source: XF Type: UNKNOWN firefox-cve20185143-xss(140256) Source: UBUNTU Type: Third Party Advisory USN-3596-1 Source: CCN Type: Mozilla Foundation Security Advisory 2018-06 Security vulnerabilities fixed in Firefox 59 Source: CONFIRM Type: Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-06/ | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |