CVE-2018-5175

MEDIUM

Description

A mechanism to bypass Content Security Policy (CSP) protections on sites that have a "script-src" policy of "'strict-dynamic'". If a target website contains an HTML injection flaw an attacker could inject a reference to a copy of the "require.js" library that is part of Firefox's Developer Tools, and then use a known technique using that library to bypass the CSP restrictions on executing injected scripts. This vulnerability affects Firefox < 60.

References

http://www.securityfocus.com/bid/104139

http://www.securitytracker.com/id/1040896

https://bugzilla.mozilla.org/show_bug.cgi?id=1432358

https://usn.ubuntu.com/3645-1/

https://www.mozilla.org/security/advisories/mfsa2018-11/

Details

Source: MITRE

Published: 2018-06-11

Updated: 2018-08-03

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 4.3

Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N)

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Impact Score: 2.7

Exploitability Score: 2.8

Severity: MEDIUM