Some HTML elements, such as <title> and <textarea>, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1910-1 | firefox-esr security update |
![]() |
DLA-1926-1 | thunderbird security update |
![]() |
DSA-4516-1 | firefox-esr security update |
![]() |
DSA-4523-1 | thunderbird security update |
![]() |
EUVD-2019-3414 | Some HTML elements, such as <title> and <textarea>, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1. |
![]() |
USN-4122-1 | Firefox vulnerabilities |
![]() |
USN-4150-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-04T23:03:32.580Z
Reserved: 2019-05-03T00:00:00
Link: CVE-2019-11744

No data.

Status : Modified
Published: 2019-09-27T18:15:12.130
Modified: 2024-11-21T04:21:42.240
Link: CVE-2019-11744


No data.