CVE-2020-12412

Publication date 9 July 2020

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

4.3 · Medium

Score breakdown

By navigating a tab using the history API, an attacker could cause the address bar to display the incorrect domain (with the https:// scheme, a blocked port number such as ‘1’, and without a lock icon) while controlling the page contents. This vulnerability affects Firefox < 70.

Read the notes from the security team

Status

Package Ubuntu Release Status
firefox 20.04 LTS focal
Fixed 70.0+build2-0ubuntu1
19.10 eoan Ignored end of life
18.04 LTS bionic
Fixed 70.0+build2-0ubuntu0.18.04.1
16.04 LTS xenial
Fixed 70.0+build2-0ubuntu0.16.04.1
14.04 LTS trusty Not in release

Notes


tyhicks

mozjs contains a copy of the SpiderMonkey JavaScript engine

Severity score breakdown

Parameter Value
Base score 4.3 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N