A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.
References
Link | Resource |
---|---|
https://www.mozilla.org/security/advisories/mfsa2020-50/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2020-51/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2020-52/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1667113 | Issue Tracking Permissions Required Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-12-08 17:15
Updated : 2020-12-09 11:49
NVD link : CVE-2020-26951
Mitre link : CVE-2020-26951
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
mozilla
- firefox
- firefox_esr
- thunderbird