Some HTML elements, such as <title> and <textarea>, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1910-1 | firefox-esr security update |
Debian DLA |
DLA-1926-1 | thunderbird security update |
Debian DSA |
DSA-4516-1 | firefox-esr security update |
Debian DSA |
DSA-4523-1 | thunderbird security update |
EUVD |
EUVD-2019-3414 | Some HTML elements, such as <title> and <textarea>, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1. |
Ubuntu USN |
USN-4122-1 | Firefox vulnerabilities |
Ubuntu USN |
USN-4150-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-04T23:03:32.580Z
Reserved: 2019-05-03T00:00:00
Link: CVE-2019-11744
No data.
Status : Modified
Published: 2019-09-27T18:15:12.130
Modified: 2024-11-21T04:21:42.240
Link: CVE-2019-11744
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN