Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5.
Metrics
Affected Vendors & Products
References
History
Wed, 27 Nov 2024 01:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Tue, 26 Nov 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5. | |
References |
|
|
MITRE
Status: PUBLISHED
Assigner: mozilla
Published: 2024-11-26T13:33:57.989Z
Updated: 2024-11-26T13:33:57.989Z
Reserved: 2024-11-25T16:29:29.656Z
Link: CVE-2024-11694
Vulnrichment
No data.
NVD
Status : Received
Published: 2024-11-26T14:15:18.943
Modified: 2024-11-26T14:15:18.943
Link: CVE-2024-11694
Redhat