First published: Tue May 21 2019(Updated: )
A custom cursor defined by scripting on a site can position itself over the addressbar to spoof the actual cursor when it should not be allowed outside of the primary web content area. This could be used by a malicious site to trick users into clicking on permission prompts, doorhanger notifications, or other buttons inadvertently if the location is spoofed over the user interface.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <67 | 67 |
Mozilla Firefox | <67.0 | |
debian/firefox | 132.0.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-11695 is a vulnerability that allows a custom cursor defined by scripting on a site to position itself over the address bar, spoofing the actual cursor and potentially tricking users into clicking on permission prompts or notification windows.
Mozilla Firefox versions up to 67.0, Debian Firefox version 118.0.2-1, and various Ubuntu Firefox versions up to 67.0+ are affected by this vulnerability.
The severity of CVE-2019-11695 is classified as medium with a severity value of 4.
To fix CVE-2019-11695, update your Mozilla Firefox to version 67.0 or higher, Debian Firefox to version 118.0.2-1, or Ubuntu Firefox to version 67.0+.
You can find more information about CVE-2019-11695 on the Mozilla Bugzilla and Mozilla Security Advisories websites.