If the "app.support.baseURL" preference is changed by a malicious local program to contain HTML and script content, this content is not sanitized. It will be executed if a user loads "chrome://browser/content/preferences/in-content/preferences.xul" directly in a tab and executes a search. This stored preference is also executed whenever an EME video player plugin displays a CDM-disabled message as a notification message. This vulnerability affects Firefox < 59.
References
Link | Resource |
---|---|
https://www.mozilla.org/security/advisories/mfsa2018-06/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1430974 | Permissions Required |
https://bugzilla.mozilla.org/show_bug.cgi?id=1430511 | Permissions Required |
https://usn.ubuntu.com/3596-1/ | Third Party Advisory |
http://www.securitytracker.com/id/1040514 | VDB Entry Third Party Advisory |
http://www.securityfocus.com/bid/103386 | Third Party Advisory VDB Entry |
Information
Published : 2018-06-11 14:29
Updated : 2018-08-03 08:52
NVD link : CVE-2018-5133
Mitre link : CVE-2018-5133
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
mozilla
- firefox
canonical
- ubuntu_linux