CVE-2020-6798
Mozilla: Incorrect parsing of template tag could result in JavaScript injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
If a template tag was used in a select tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability as a result. In general, this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but is potentially a risk in browser or browser-like contexts. This vulnerability affects Thunderbird < 68.5, Firefox < 73, and Firefox < ESR68.5.
Si se usó una etiqueta template en una etiqueta select, el analizador podría ser confundido y permitir el análisis y la ejecución de JavaScript cuando no debería ser permitido. Un sitio que se basó en que el navegador se comportara correctamente podría sufrir una vulnerabilidad de tipo cross-site scripting como resultado de ello. En general, este fallo no puede ser explotado por medio del correo electrónico en el producto Thunderbird porque el scripting es deshabilitado cuando se lee el correo, pero es potencialmente un riesgo en el navegador o en contextos similares a los del navegador. Esta vulnerabilidad afecta a Thunderbird versiones anteriores a 68.5, Firefox versiones anteriores a 73, y Firefox versiones anteriores a ESR68.5.
Multiple security issues were discovered in Thunderbird. If a user were tricked in to opening a specially crafted website in a browsing context, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass security restrictions, bypass same-origin restrictions, conduct cross-site scripting attacks, or execute arbitrary code. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-10 CVE Reserved
- 2020-02-14 CVE Published
- 2024-08-04 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (10)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202003-02 | 2020-03-12 | |
https://security.gentoo.org/glsa/202003-10 | 2020-03-12 | |
https://usn.ubuntu.com/4278-2 | 2020-03-12 | |
https://usn.ubuntu.com/4328-1 | 2020-03-12 | |
https://usn.ubuntu.com/4335-1 | 2020-03-12 | |
https://www.mozilla.org/security/advisories/mfsa2020-05 | 2020-03-12 | |
https://www.mozilla.org/security/advisories/mfsa2020-06 | 2020-03-12 | |
https://www.mozilla.org/security/advisories/mfsa2020-07 | 2020-03-12 | |
https://access.redhat.com/security/cve/CVE-2020-6798 | 2020-02-24 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1801918 | 2020-02-24 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | < 73.0 Search vendor "Mozilla" for product "Firefox" and version " < 73.0" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Esr Search vendor "Mozilla" for product "Firefox Esr" | < 68.5.0 Search vendor "Mozilla" for product "Firefox Esr" and version " < 68.5.0" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Thunderbird Search vendor "Mozilla" for product "Thunderbird" | < 68.5.0 Search vendor "Mozilla" for product "Thunderbird" and version " < 68.5.0" | - |
Affected
|