CVE-2020-6798
Mozilla: Incorrect parsing of template tag could result in JavaScript injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
If a template tag was used in a select tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability as a result. In general, this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but is potentially a risk in browser or browser-like contexts. This vulnerability affects Thunderbird < 68.5, Firefox < 73, and Firefox < ESR68.5.
Si se usó una etiqueta template en una etiqueta select, el analizador podría ser confundido y permitir el análisis y la ejecución de JavaScript cuando no debería ser permitido. Un sitio que se basó en que el navegador se comportara correctamente podría sufrir una vulnerabilidad de tipo cross-site scripting como resultado de ello. En general, este fallo no puede ser explotado por medio del correo electrónico en el producto Thunderbird porque el scripting es deshabilitado cuando se lee el correo, pero es potencialmente un riesgo en el navegador o en contextos similares a los del navegador. Esta vulnerabilidad afecta a Thunderbird versiones anteriores a 68.5, Firefox versiones anteriores a 73, y Firefox versiones anteriores a ESR68.5.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-10 CVE Reserved
- 2020-02-14 CVE Published
- 2024-02-06 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (10)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202003-02 | 2020-03-12 | |
https://security.gentoo.org/glsa/202003-10 | 2020-03-12 | |
https://usn.ubuntu.com/4278-2 | 2020-03-12 | |
https://usn.ubuntu.com/4328-1 | 2020-03-12 | |
https://usn.ubuntu.com/4335-1 | 2020-03-12 | |
https://www.mozilla.org/security/advisories/mfsa2020-05 | 2020-03-12 | |
https://www.mozilla.org/security/advisories/mfsa2020-06 | 2020-03-12 | |
https://www.mozilla.org/security/advisories/mfsa2020-07 | 2020-03-12 | |
https://access.redhat.com/security/cve/CVE-2020-6798 | 2020-02-24 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1801918 | 2020-02-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | < 73.0 Search vendor "Mozilla" for product "Firefox" and version " < 73.0" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Esr Search vendor "Mozilla" for product "Firefox Esr" | < 68.5.0 Search vendor "Mozilla" for product "Firefox Esr" and version " < 68.5.0" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Thunderbird Search vendor "Mozilla" for product "Thunderbird" | < 68.5.0 Search vendor "Mozilla" for product "Thunderbird" and version " < 68.5.0" | - |
Affected
|