First published: Tue Jul 09 2019(Updated: )
Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <68 | 68 |
<68 | 68 | |
Mozilla Firefox | <68.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
<68 | 68 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-11720 is a vulnerability that allows malicious code to be processed in web content, evading cross-site scripting (XSS) filtering.
CVE-2019-11720 affects Mozilla Firefox versions up to and excluding version 68, as well as Mozilla Thunderbird, openSUSE Leap 15.0, and openSUSE Leap 15.1.
The severity of CVE-2019-11720 is medium, with a CVSS score of 6.1.
CVE-2019-11720 incorrectly treats some unicode characters as whitespace during web content parsing, allowing malicious code to evade XSS filtering.
To fix CVE-2019-11720, update your Mozilla Firefox or Mozilla Thunderbird to version 68 or above.