Regular expressions used to filter out forbidden properties and values from style directives in calls to <code>console.log</code> weren't accounting for external URLs. Data could then be potentially exfiltrated from the browser. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3275-1 | firefox-esr security update |
![]() |
DLA-3324-1 | thunderbird security update |
![]() |
DSA-5322-1 | firefox-esr security update |
![]() |
DSA-5355-1 | thunderbird security update |
![]() |
EUVD-2023-27703 | Regular expressions used to filter out forbidden properties and values from style directives in calls to <code>console.log</code> weren't accounting for external URLs. Data could then be potentially exfiltrated from the browser. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7. |
![]() |
USN-5816-1 | Firefox vulnerabilities |
![]() |
USN-5824-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 10 Jan 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-770 | |
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2025-01-10T18:09:25.352Z
Reserved: 2023-01-16T00:00:00
Link: CVE-2023-23603

Updated: 2024-08-02T10:35:33.580Z

Status : Modified
Published: 2023-06-02T17:15:10.823
Modified: 2025-01-10T18:15:16.460
Link: CVE-2023-23603


No data.