If the "app.support.baseURL" preference is changed by a malicious local program to contain HTML and script content, this content is not sanitized. It will be executed if a user loads "chrome://browser/content/preferences/in-content/preferences.xul" directly in a tab and executes a search. This stored preference is also executed whenever an EME video player plugin displays a CDM-disabled message as a notification message. This vulnerability affects Firefox < 59.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103386 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040514 | VDB Entry Third Party Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1430511 | Permissions Required |
https://bugzilla.mozilla.org/show_bug.cgi?id=1430974 | Permissions Required |
https://usn.ubuntu.com/3596-1/ | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2018-06/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mozilla
Published: 2018-06-11T21:00:00
Updated: 2018-06-12T09:57:01
Reserved: 2018-01-03T00:00:00
Link: CVE-2018-5133
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-06-11T21:29:14.250
Modified: 2018-08-03T15:52:13.057
Link: CVE-2018-5133
JSON object: View
Redhat Information
No data.
CWE