A custom cursor defined by scripting on a site can position itself over the addressbar to spoof the actual cursor when it should not be allowed outside of the primary web content area. This could be used by a malicious site to trick users into clicking on permission prompts, doorhanger notifications, or other buttons inadvertently if the location is spoofed over the user interface. This vulnerability affects Firefox < 67.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published: 2019-07-23T13:22:31

Updated: 2024-08-04T23:03:32.450Z

Reserved: 2019-05-03T00:00:00

Link: CVE-2019-11695

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2019-07-23T14:15:14.263

Modified: 2020-08-24T17:37:01.140

Link: CVE-2019-11695

cve-icon Redhat

No data.