4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
6.7 Medium
AI Score
Confidence
High
0.003 Low
EPSS
Percentile
70.0%
By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.
lists.opensuse.org/opensuse-security-announce/2020-08/msg00022.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html
lists.opensuse.org/opensuse-security-announce/2020-08/msg00032.html
bugzilla.mozilla.org/show_bug.cgi?id=1634872
usn.ubuntu.com/4443-1/
www.mozilla.org/security/advisories/mfsa2020-30/
www.mozilla.org/security/advisories/mfsa2020-31/
www.mozilla.org/security/advisories/mfsa2020-32/
www.mozilla.org/security/advisories/mfsa2020-33/
www.mozilla.org/security/advisories/mfsa2020-35/
4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
6.7 Medium
AI Score
Confidence
High
0.003 Low
EPSS
Percentile
70.0%