CVE-2020-26966
https://notcve.org/view.php?id=CVE-2020-26966
Searching for a single word from the address bar caused an mDNS request to be sent on the local network searching for a hostname consisting of that string; resulting in an information leak. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5. Una búsqueda de una sola palabra en la barra de direcciones causó que se enviara una petición mDNS en la red local buscando un nombre de host que constara de esa cadena; resultando en una filtración de información. • https://bugzilla.mozilla.org/show_bug.cgi?id=1663571 https://www.mozilla.org/security/advisories/mfsa2020-50 https://www.mozilla.org/security/advisories/mfsa2020-51 https://www.mozilla.org/security/advisories/mfsa2020-52 •
CVE-2020-26958 – Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions
https://notcve.org/view.php?id=CVE-2020-26958
Firefox did not block execution of scripts with incorrect MIME types when the response was intercepted and cached through a ServiceWorker. This could lead to a cross-site script inclusion vulnerability, or a Content Security Policy bypass. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5. Firefox no bloqueó una ejecución de scripts con tipos MIME incorrectos cuando la respuesta fue interceptada y almacenada en caché por medio de un ServiceWorker. Esto podría conllevar a una vulnerabilidad de inclusión de cross-site script, o una omisión de Content Security Policy. • https://bugzilla.mozilla.org/show_bug.cgi?id=1669355 https://www.mozilla.org/security/advisories/mfsa2020-50 https://www.mozilla.org/security/advisories/mfsa2020-51 https://www.mozilla.org/security/advisories/mfsa2020-52 https://access.redhat.com/security/cve/CVE-2020-26958 https://bugzilla.redhat.com/show_bug.cgi?id=1898735 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2020-26965 – Mozilla: Software keyboards may have remembered typed passwords
https://notcve.org/view.php?id=CVE-2020-26965
Some websites have a feature "Show Password" where clicking a button will change a password field into a textbook field, revealing the typed password. If, when using a software keyboard that remembers user input, a user typed their password and used that feature, the type of the password field was changed, resulting in a keyboard layout change and the possibility for the software keyboard to remember the typed password. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5. Algunos sitios web presentan una funcionalidad "Show Password" donde al hacer clic en un botón se cambiará un campo de contraseña en un campo textbook, divulgando la contraseña escrita. Si, al usar un teclado de software que recuerda la entrada del usuario, un usuario escribió su contraseña y usó esa funcionalidad, se cambió el tipo de campo de contraseña, resultando en un cambio de distribución del teclado y la posibilidad de que el teclado de software recuerde la contraseña escrita. • https://bugzilla.mozilla.org/show_bug.cgi?id=1661617 https://www.mozilla.org/security/advisories/mfsa2020-50 https://www.mozilla.org/security/advisories/mfsa2020-51 https://www.mozilla.org/security/advisories/mfsa2020-52 https://access.redhat.com/security/cve/CVE-2020-26965 https://bugzilla.redhat.com/show_bug.cgi?id=1898739 • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •
CVE-2020-26960 – Mozilla: Potential use-after-free in uses of nsTArray
https://notcve.org/view.php?id=CVE-2020-26960
If the Compact() method was called on an nsTArray, the array could have been reallocated without updating other pointers, leading to a potential use-after-free and exploitable crash. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5. Si el método Compact() fue llamado en un nsTArray, el array podría haber sido reasignado sin actualizar otros punteros, conllevando a un potencial uso de la memoria previamente liberada y un bloqueo explotable. Esta vulnerabilidad afecta a Firefox versiones anteriores a 83, Firefox ESR versiones anteriores a 78.5, y Thunderbird versiones anteriores a 78.5 • https://bugzilla.mozilla.org/show_bug.cgi?id=1670358 https://www.mozilla.org/security/advisories/mfsa2020-50 https://www.mozilla.org/security/advisories/mfsa2020-51 https://www.mozilla.org/security/advisories/mfsa2020-52 https://access.redhat.com/security/cve/CVE-2020-26960 https://bugzilla.redhat.com/show_bug.cgi?id=1898737 • CWE-416: Use After Free •
CVE-2020-26953 – Mozilla: Fullscreen could be enabled without displaying the security UI
https://notcve.org/view.php?id=CVE-2020-26953
It was possible to cause the browser to enter fullscreen mode without displaying the security UI; thus making it possible to attempt a phishing attack or otherwise confuse the user. This vulnerability affects Firefox < 83, Firefox ESR < 78.5, and Thunderbird < 78.5. Fue posible causar que el navegador entre en modo de pantalla completa sin mostrar la interfaz de seguridad, lo que permite intentar un ataque de phishing o confundir de alguna manera al usuario. Esta vulnerabilidad afecta a Firefox versiones anteriores a 83, Firefox ESR versiones anteriores a 78.5, y Thunderbird versiones anteriores a 78.5 • https://bugzilla.mozilla.org/show_bug.cgi?id=1656741 https://www.mozilla.org/security/advisories/mfsa2020-50 https://www.mozilla.org/security/advisories/mfsa2020-51 https://www.mozilla.org/security/advisories/mfsa2020-52 https://access.redhat.com/security/cve/CVE-2020-26953 https://bugzilla.redhat.com/show_bug.cgi?id=1898733 • CWE-451: User Interface (UI) Misrepresentation of Critical Information CWE-1021: Improper Restriction of Rendered UI Layers or Frames •