When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105721 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1041944 | VDB Entry Third Party Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1490276 | Issue Tracking Permissions Required Vendor Advisory |
https://usn.ubuntu.com/3801-1/ | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2018-26/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mozilla
Published: 2019-02-28T18:00:00
Updated: 2019-03-01T10:57:01
Reserved: 2018-06-14T00:00:00
Link: CVE-2018-12399
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-02-28T18:29:01.023
Modified: 2019-03-01T14:25:15.093
Link: CVE-2018-12399
JSON object: View
Redhat Information
No data.
CWE