Vulnerability Name: | CVE-2022-40956 (CCN-236607) | ||||||||||||||||||||||||||||||||
Assigned: | 2022-09-20 | ||||||||||||||||||||||||||||||||
Published: | 2022-09-20 | ||||||||||||||||||||||||||||||||
Updated: | 2022-12-30 | ||||||||||||||||||||||||||||||||
Summary: | When injecting an HTML base element, some requests would ignore the CSP's base-uri settings and accept the injected element's base instead. This vulnerability affects Firefox ESR < 102.3, Thunderbird < 102.3, and Firefox < 105. | ||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 6.1 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) 5.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
5.3 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:C/A:N)
| ||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-1021 | ||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-40956 Source: security@mozilla.org Type: Issue Tracking, Permissions Required, Vendor Advisory security@mozilla.org Source: XF Type: UNKNOWN firefox-cve202240956-sec-bypass(236607) Source: CCN Type: IBM Security Bulletin 6842099 (Application Performance Management) Multiple vulnerabilities of Mozilla Firefox (less than Firefox 102.4ESR) have affected Synthetic Playback Agent 8.1.4.0-8.1.4 IF16 - 2022.4.0 Source: CCN Type: Mozilla Foundation Security Advisory 2022-40 Security Vulnerabilities fixed in Firefox 105 Source: CCN Type: Mozilla Foundation Security Advisory 2022-41 Security Vulnerabilities fixed in Firefox ESR 102.3 Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org Source: security@mozilla.org Type: Vendor Advisory security@mozilla.org | ||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
BACK |