mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
342 lines
11 KiB
JSON
342 lines
11 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2019-17022",
|
||
|
"sourceIdentifier": "security@mozilla.org",
|
||
|
"published": "2020-01-08T22:15:12.730",
|
||
|
"lastModified": "2020-01-13T20:15:12.733",
|
||
|
"vulnStatus": "Modified",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "When pasting a <style> tag from the clipboard into a rich text editor, the CSS sanitizer does not escape < and > characters. Because the resulting string is pasted directly into the text node of the element this does not result in a direct injection into the webpage; however, if a webpage subsequently copies the node's innerHTML, assigning it to another innerHTML, this would result in an XSS vulnerability. Two WYSIWYG editors were identified with this behavior, more may exist. This vulnerability affects Firefox ESR < 68.4 and Firefox < 72."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Al pegar un <style> etiqueta del portapapeles en un editor de texto enriquecido, el saneador CSS no escapa caracteres < y >. Debido a que la cadena resultante es pegada directamente en el nodo de texto del elemento, esto no resulta en una inyecci\u00f3n directa en la p\u00e1gina web; sin embargo, si una p\u00e1gina web posteriormente copia el innerHTML del nodo y lo asigna a otro innerHTML, esto generar\u00eda una vulnerabilidad XSS. Dos editores WYSIWYG fueron identificados con este comportamiento, pueden existir m\u00e1s. Esta vulnerabilidad afecta a Firefox ESR versiones anteriores a la versi\u00f3n 68.4 y Firefox versiones anteriores a la versi\u00f3n 72."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "REQUIRED",
|
||
|
"scope": "CHANGED",
|
||
|
"confidentialityImpact": "LOW",
|
||
|
"integrityImpact": "LOW",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 6.1,
|
||
|
"baseSeverity": "MEDIUM"
|
||
|
},
|
||
|
"exploitabilityScore": 2.8,
|
||
|
"impactScore": 2.7
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "MEDIUM",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "NONE",
|
||
|
"integrityImpact": "PARTIAL",
|
||
|
"availabilityImpact": "NONE",
|
||
|
"baseScore": 4.3
|
||
|
},
|
||
|
"baseSeverity": "MEDIUM",
|
||
|
"exploitabilityScore": 8.6,
|
||
|
"impactScore": 2.9,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": true
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-79"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "72.0",
|
||
|
"matchCriteriaId": "1398139B-C837-4BF4-8555-5D722B91F646"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "68.4",
|
||
|
"matchCriteriaId": "ACE15104-6EDD-46EA-9596-28FEB99B563F"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
|
||
|
"matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
|
||
|
"matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00029.html",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00043.html",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "http://packetstormsecurity.com/files/155912/Slackware-Security-Advisory-mozilla-thunderbird-Updates.html",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://access.redhat.com/errata/RHSA-2020:0085",
|
||
|
"source": "security@mozilla.org",
|
||
|
"tags": [
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://access.redhat.com/errata/RHSA-2020:0086",
|
||
|
"source": "security@mozilla.org",
|
||
|
"tags": [
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://access.redhat.com/errata/RHSA-2020:0111",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://access.redhat.com/errata/RHSA-2020:0120",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://access.redhat.com/errata/RHSA-2020:0123",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://access.redhat.com/errata/RHSA-2020:0127",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://access.redhat.com/errata/RHSA-2020:0292",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://access.redhat.com/errata/RHSA-2020:0295",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1602843",
|
||
|
"source": "security@mozilla.org",
|
||
|
"tags": [
|
||
|
"Permissions Required"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00005.html",
|
||
|
"source": "security@mozilla.org",
|
||
|
"tags": [
|
||
|
"Mailing List",
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00016.html",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://seclists.org/bugtraq/2020/Jan/12",
|
||
|
"source": "security@mozilla.org",
|
||
|
"tags": [
|
||
|
"Mailing List",
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://seclists.org/bugtraq/2020/Jan/18",
|
||
|
"source": "security@mozilla.org",
|
||
|
"tags": [
|
||
|
"Mailing List",
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://seclists.org/bugtraq/2020/Jan/26",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://security.gentoo.org/glsa/202003-02",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://usn.ubuntu.com/4234-1/",
|
||
|
"source": "security@mozilla.org",
|
||
|
"tags": [
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://usn.ubuntu.com/4241-1/",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://usn.ubuntu.com/4335-1/",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.debian.org/security/2020/dsa-4600",
|
||
|
"source": "security@mozilla.org",
|
||
|
"tags": [
|
||
|
"Third Party Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.debian.org/security/2020/dsa-4603",
|
||
|
"source": "security@mozilla.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.mozilla.org/security/advisories/mfsa2020-01/",
|
||
|
"source": "security@mozilla.org",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"url": "https://www.mozilla.org/security/advisories/mfsa2020-02/",
|
||
|
"source": "security@mozilla.org",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|