First published: Wed May 09 2018(Updated: )
A mechanism to bypass Content Security Policy (CSP) protections on sites that have a "script-src" policy of "'strict-dynamic'". If a target website contains an HTML injection flaw an attacker could inject a reference to a copy of the "require.js" library that is part of Firefox's Developer Tools, and then use a known technique using that library to bypass the CSP restrictions on executing injected scripts. This vulnerability affects Firefox < 60.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <60 | 60 |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Canonical Ubuntu Linux | =18.04 | |
Mozilla Firefox | <60.0 | |
debian/firefox | 131.0.2-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-5175 is a vulnerability that allows bypassing Content Security Policy (CSP) protections on websites with a 'strict-dynamic' policy.
Mozilla Firefox versions up to 60.0, Ubuntu with Firefox versions up to 60.0, and various versions of Canonical Ubuntu Linux are affected by CVE-2018-5175.
The severity rating of CVE-2018-5175 is medium with a CVSS score of 6.1.
To fix CVE-2018-5175, update your Mozilla Firefox browser to version 60.0 or higher, or update Ubuntu or Canonical Ubuntu Linux to versions that include Firefox 60.0 or higher.
You can find more information about CVE-2018-5175 at the following references: <ul><li>https://bugzilla.mozilla.org/show_bug.cgi?id=1432358</li><li>https://www.mozilla.org/en-US/security/advisories/mfsa2018-11/</li><li>http://www.securityfocus.com/bid/104139</li></ul>