{ "id": "CVE-2023-23603", "sourceIdentifier": "security@mozilla.org", "published": "2023-06-02T17:15:10.823", "lastModified": "2025-01-10T18:15:16.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Regular expressions used to filter out forbidden properties and values from style directives in calls to console.log weren't accounting for external URLs. Data could then be potentially exfiltrated from the browser. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7." } ], "metrics": { "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 3.6 }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-770" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "versionEndExcluding": "109.0", "matchCriteriaId": "2809632C-444A-49A3-A7E7-D3BB027A91B8" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.7", "matchCriteriaId": "1D5D3545-44B1-4576-B1BA-C461D4DC09A3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "versionEndExcluding": "102.7", "matchCriteriaId": "E73E816A-885B-49D4-BB52-220D30866D7C" } ] } ] } ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1800832", "source": "security@mozilla.org", "tags": [ "Issue Tracking", "Permissions Required", "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-01/", "source": "security@mozilla.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-02/", "source": "security@mozilla.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-03/", "source": "security@mozilla.org", "tags": [ "Vendor Advisory" ] }, { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1800832", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Permissions Required", "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-01/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-02/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2023-03/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] } ] }