2024-07-14 02:06:08 +00:00

90 lines
2.6 KiB
JSON

{
"id": "CVE-2022-31743",
"sourceIdentifier": "security@mozilla.org",
"published": "2022-12-22T20:15:29.517",
"lastModified": "2023-01-03T21:20:20.160",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Firefox's HTML parser did not correctly interpret HTML comment tags, resulting in an incongruity with other browsers. This could have been used to escape HTML comments on pages that put user-controlled data in them. This vulnerability affects Firefox < 101."
},
{
"lang": "es",
"value": "El analizador HTML de Firefox no interpret\u00f3 correctamente las etiquetas de comentarios HTML, lo que provoc\u00f3 una incongruencia con otros navegadores. Esto podr\u00eda haberse utilizado para escapar de los comentarios HTML en p\u00e1ginas que contienen datos controlados por el usuario. Esta vulnerabilidad afecta a Firefox &lt; 101."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"versionEndExcluding": "101.0",
"matchCriteriaId": "52843F5C-D729-47F6-AAAF-7BAFCE67D91F"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1747388",
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
]
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-20/",
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
]
}
]
}