First published: Tue Jan 07 2020(Updated: )
If an XML file is served with a Content Security Policy and the XML file includes an XSL stylesheet, the Content Security Policy will not be applied to the contents of the XSL stylesheet. If the XSL sheet e.g. includes JavaScript, it would bypass any of the restrictions of the Content Security Policy applied to the XML document.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <72 | 72 |
Mozilla Firefox | <72.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.04 | |
Canonical Ubuntu Linux | =19.10 | |
debian/firefox | 132.0.2-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-17020 is a vulnerability that allows an XML file with an XSL stylesheet to bypass the Content Security Policy.
CVE-2019-17020 has a severity of 6.5, which is considered medium.
Mozilla Firefox versions up to 72.0.1 and Ubuntu Linux with Firefox up to version 72.0.1 are affected by CVE-2019-17020.
To fix CVE-2019-17020, update Mozilla Firefox to version 72.0.1 or later, or update Ubuntu Linux with Firefox to version 72.0.1 or later.
For more information about CVE-2019-17020, you can visit the following references: [Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1597645), [Mozilla Security Advisories](https://www.mozilla.org/en-US/security/advisories/mfsa2020-01/)