If a Content Security Policy (CSP) directive is defined that uses a
hash-based source that takes the empty string as input, execution of any
javascript: URIs will be allowed. This could allow for malicious JavaScript
content to be run, bypassing CSP permissions. This vulnerability affects
Firefox < 69 and Firefox ESR < 68.1.
Author | Note |
---|---|
tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | firefox | < 69.0+build2-0ubuntu0.18.04.1 | UNKNOWN |
ubuntu | 19.04 | noarch | firefox | < 69.0+build2-0ubuntu0.19.04.1 | UNKNOWN |
ubuntu | 19.10 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 20.04 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 20.10 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 21.04 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 21.10 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 22.04 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 22.10 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 23.04 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |