| Title | Firefox における入力確認に関する脆弱性 |
|---|---|
| Summary | Firefox には、入力確認に関する脆弱性が存在します。 |
| Possible impacts | 情報を取得される、および情報を改ざんされる可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | May 9, 2018, midnight |
| Registration Date | Aug. 17, 2018, 6:24 p.m. |
| Last Update | Aug. 17, 2018, 6:24 p.m. |
| CVSS3.0 : 警告 | |
| Score | 6.1 |
|---|---|
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
| CVSS2.0 : 警告 | |
| Score | 4.3 |
|---|---|
| Vector | AV:N/AC:M/Au:N/C:N/I:P/A:N |
| Mozilla Foundation |
| Mozilla Firefox 60 未満 |
| Canonical |
| Ubuntu |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2018年08月17日] 掲載 |
Aug. 17, 2018, 6:24 p.m. |
| Summary | The JSON Viewer displays clickable hyperlinks for strings that are parseable as URLs, including "javascript:" links. If a JSON file contains malicious JavaScript script embedded as "javascript:" links, users may be tricked into clicking and running this code in the context of the JSON Viewer. This can allow for the theft of cookies and authorization tokens which are accessible to that context. This vulnerability affects Firefox < 60. |
|---|---|
| Publication Date | June 12, 2018, 6:29 a.m. |
| Registration Date | March 1, 2021, 7:30 p.m. |
| Last Update | Nov. 21, 2024, 1:08 p.m. |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* | |||||
| cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* | |||||
| cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:* | 60.0 | ||||