First published: Tue Jun 26 2018(Updated: )
In Reader View SameSite cookie protections are not checked on exiting. This allows for a payload to be triggered when Reader View is exited if loaded by a malicious site while Reader mode is active, bypassing CSRF protections.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/firefox | 135.0.1-1 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 | |
Ubuntu | =18.04 | |
Firefox | <61.0 | |
Firefox | <61 | 61 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-12370 has been classified as a high severity vulnerability.
To fix CVE-2018-12370, update Firefox to version 61.0 or higher, or upgrade your affected Ubuntu version to a patched release.
Firefox versions prior to 61.0 are affected by CVE-2018-12370.
Ubuntu versions 14.04, 16.04, 17.10, and 18.04 are vulnerable to CVE-2018-12370.
CVE-2018-12370 enables a cross-site request forgery (CSRF) attack when exiting Reader View.