Vulnerability Details : CVE-2019-11738
Potential exploit
If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.
Products affected by CVE-2019-11738
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-11738
0.59%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 67 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-11738
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
6.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
2.8
|
3.4
|
NIST |
References for CVE-2019-11738
-
https://www.mozilla.org/security/advisories/mfsa2019-25/
Security vulnerabilities fixed in Firefox 69 — MozillaVendor Advisory
-
https://www.mozilla.org/security/advisories/mfsa2019-26/
Security vulnerabilities fixed in Firefox ESR 68.1 — MozillaVendor Advisory
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1452037
Access DeniedExploit;Issue Tracking;Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html
[security-announce] openSUSE-SU-2019:2251-1: important: Security updateMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html
[security-announce] openSUSE-SU-2019:2260-1: important: Security updateMailing List;Third Party Advisory
Jump to