When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63.
References
Link Resource
http://www.securityfocus.com/bid/105721 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1041944 VDB Entry Third Party Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1490276 Issue Tracking Permissions Required Vendor Advisory
https://usn.ubuntu.com/3801-1/ Third Party Advisory
https://www.mozilla.org/security/advisories/mfsa2018-26/ Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mozilla

Published: 2019-02-28T18:00:00

Updated: 2019-03-01T10:57:01

Reserved: 2018-06-14T00:00:00


Link: CVE-2018-12399

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-02-28T18:29:01.023

Modified: 2019-03-01T14:25:15.093


Link: CVE-2018-12399

JSON object: View

cve-icon Redhat Information

No data.

CWE