Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5.
History

Wed, 27 Nov 2024 01:30:00 +0000

Type Values Removed Values Added
Title firefox: thunderbird: CSP Bypass and XSS Exposure via Web Compatibility Shims
Weaknesses CWE-79
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

threat_severity

Moderate


Tue, 26 Nov 2024 13:45:00 +0000

Type Values Removed Values Added
Description Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published: 2024-11-26T13:33:57.989Z

Updated: 2024-11-26T13:33:57.989Z

Reserved: 2024-11-25T16:29:29.656Z

Link: CVE-2024-11694

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2024-11-26T14:15:18.943

Modified: 2024-11-26T14:15:18.943

Link: CVE-2024-11694

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-11-26T13:33:57Z

Links: CVE-2024-11694 - Bugzilla