CVE-2020-6808

EUVD-2020-27954
When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was the originating javascript: URL which could lead to spoofing attacks; it is now correctly the URL of the originating document. This vulnerability affects Firefox < 74.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 57%
Affected Products (NVD)
VendorProductVersion
mozillafirefox
𝑥
< 74.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
firefox
sid
132.0.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
firefox
bionic
Fixed 74.0+build3-0ubuntu0.18.04.1
released
eoan
Fixed 74.0+build3-0ubuntu0.19.10.1
released
focal
Fixed 74.0+build3-0ubuntu1
released
groovy
Fixed 74.0+build3-0ubuntu1
released
hirsute
Fixed 74.0+build3-0ubuntu1
released
impish
Fixed 74.0+build3-0ubuntu1
released
jammy
Fixed 74.0+build3-0ubuntu1
released
kinetic
Fixed 74.0+build3-0ubuntu1
released
lunar
Fixed 74.0+build3-0ubuntu1
released
mantic
Fixed 74.0+build3-0ubuntu1
released
noble
Fixed 74.0+build3-0ubuntu1
released
trusty
dne
xenial
Fixed 74.0+build3-0ubuntu0.16.04.1
released
mozjs38
bionic
ignored
eoan
dne
focal
dne
groovy
dne
hirsute
dne
impish
dne
jammy
dne
kinetic
dne
lunar
dne
mantic
dne
noble
dne
trusty
dne
xenial
dne
mozjs52
bionic
ignored
eoan
ignored
focal
ignored
groovy
ignored
hirsute
dne
impish
dne
jammy
dne
kinetic
dne
lunar
dne
mantic
dne
noble
dne
trusty
dne
xenial
dne
mozjs60
bionic
dne
eoan
ignored
focal
dne
groovy
dne
hirsute
dne
impish
dne
jammy
dne
kinetic
dne
lunar
dne
mantic
dne
noble
dne
trusty
dne
xenial
dne