Vulnerability CVE-2018-5176: Information

Description

The JSON Viewer displays clickable hyperlinks for strings that are parseable as URLs, including "javascript:" links. If a JSON file contains malicious JavaScript script embedded as "javascript:" links, users may be tricked into clicking and running this code in the context of the JSON Viewer. This can allow for the theft of cookies and authorization tokens which are accessible to that context. This vulnerability affects Firefox < 60.

Severity: MEDIUM (6.1) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Published: June 12, 2018
Modified: Aug. 3, 2018
Error type identifier: CWE-20

Fixed packages

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://www.mozilla.org/security/advisories/mfsa2018-11/
  • Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1442840
  • Issue Tracking
  • Permissions Required
  • Vendor Advisory
USN-3645-1
  • Third Party Advisory
1040896
  • Third Party Advisory
  • VDB Entry
104139
  • Third Party Advisory
  • VDB Entry
    1. Configuration 1

      cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

      Configuration 2

      cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
      End excliding
      60.0