CVE-2019-11738
27.09.2019, 18:15
If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox < 69 and Firefox ESR < 68.1.Enginsight
Vendor | Product | Version |
---|---|---|
mozilla | firefox | 𝑥 < 69.0 |
mozilla | firefox_esr | 𝑥 < 68.1.0 |
opensuse | leap | 15.0 |
opensuse | leap | 15.1 |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
firefox |
| ||||||||||||||||||
firefox-esr |
|

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
firefox |
| ||||||||||||||||||||||||||||
mozjs38 |
| ||||||||||||||||||||||||||||
mozjs52 |
| ||||||||||||||||||||||||||||
mozjs60 |
|
References