First published: Tue Jul 09 2019(Updated: )
POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <68 | 68 |
<68 | 68 | |
<60.8 | 60.8 | |
<60.8 | 60.8 | |
Mozilla Firefox | <68.0 | |
Mozilla Firefox ESR | <60.8.0 | |
Mozilla Thunderbird | <60.8.0 | |
<68 | 68 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2019-11712 is a vulnerability that allows POST requests made by NPAPI plugins to bypass CORS requirements, leading to potential Cross-Site Request Forgery (CSRF) attacks.
CVE-2019-11712 affects Firefox ESR versions prior to 60.8, Firefox versions prior to 68, and Thunderbird versions prior to 60.8.
CVE-2019-11712 is classified as a high severity vulnerability with a CVSS score of 8.8.
An attacker can exploit CVE-2019-11712 by tricking a user into visiting a malicious website that contains a CSRF attack, potentially leading to unauthorized actions on the user's behalf.
Yes, updating to Firefox ESR 60.8, Firefox 68, or Thunderbird 60.8 or later versions will resolve the vulnerability.