A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1667113 | Issue Tracking Permissions Required Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2020-50/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2020-51/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2020-52/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mozilla
Published: 2020-12-09T00:19:43
Updated: 2020-12-09T00:19:43
Reserved: 2020-10-12T00:00:00
Link: CVE-2020-26951
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-12-09T01:15:12.643
Modified: 2020-12-09T19:49:24.543
Link: CVE-2020-26951
JSON object: View
Redhat Information
No data.
CWE