First published: Tue Jul 09 2019(Updated: )
A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <68 | 68 |
<68 | 68 | |
<60.8 | 60.8 | |
<60.8 | 60.8 | |
Mozilla Firefox | <68.0 | |
Mozilla Firefox ESR | <60.8.0 | |
Mozilla Thunderbird | <60.8.0 | |
Debian Debian Linux | =8.0 | |
Novell Suse Package Hub For Suse Linux Enterprise | =12 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
<68 | 68 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2019-11717 is a vulnerability where the caret ( ^ ) character is improperly escaped constructing some URIs, allowing for possible spoofing of origin attributes.
CVE-2019-11717 affects Firefox ESR versions earlier than 60.8, Firefox versions earlier than 68, and Thunderbird versions earlier than 60.8.
The severity of CVE-2019-11717 is medium with a CVSS score of 5.3.
To fix CVE-2019-11717, users should update to Firefox ESR version 60.8 or later, Firefox version 68 or later, or Thunderbird version 60.8 or later.
More information about CVE-2019-11717 can be found at the following references: [Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1548306), [Mozilla Security Advisories](https://www.mozilla.org/en-US/security/advisories/mfsa2019-23/), [Mozilla Security Advisories](https://www.mozilla.org/en-US/security/advisories/mfsa2019-28/).