CVE-2018-5143
Publication date 14 March 2018
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
URLs using "javascript:" have the protocol removed when pasted into the addressbar to protect users from cross-site scripting (XSS) attacks, but if a tab character is embedded in the "javascript:" URL the protocol is not removed and the script will execute. This could allow users to be socially engineered to run an XSS attack against themselves. This vulnerability affects Firefox < 59.
Status
Package | Ubuntu Release | Status |
---|---|---|
firefox | 18.04 LTS bionic |
Fixed 59.0.1+build1-0ubuntu1
|
16.04 LTS xenial |
Fixed 59.0+build5-0ubuntu0.16.04.1
|
|
14.04 LTS trusty |
Fixed 59.0+build5-0ubuntu0.14.04.1
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3596-1
- Firefox vulnerabilities
- 14 March 2018