A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1869-1 | firefox-esr security update |
![]() |
DLA-1870-1 | thunderbird security update |
![]() |
DSA-4479-1 | firefox-esr security update |
![]() |
DSA-4482-1 | thunderbird security update |
![]() |
EUVD-2019-3387 | A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8. |
![]() |
USN-4054-1 | Firefox vulnerabilities |
![]() |
USN-4064-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-04T23:03:32.386Z
Reserved: 2019-05-03T00:00:00
Link: CVE-2019-11717

No data.

Status : Modified
Published: 2019-07-23T14:15:15.937
Modified: 2024-11-21T04:21:39.343
Link: CVE-2019-11717


No data.