First published: Tue May 05 2020(Updated: )
Last updated 24 July 2024
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/firefox | 130.0-2 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 115.15.0esr-1~deb11u1 115.14.0esr-1~deb12u1 115.15.0esr-1~deb12u1 115.15.0esr-1 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:115.15.0-1~deb11u1 1:115.12.0-1~deb12u1 1:115.15.0-1~deb12u1 1:128.1.1esr-1 1:128.2.0esr-1 | |
Firefox | <76.0 | |
Firefox ESR | <68.8.0 | |
Thunderbird | <68.8.0 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.10 | |
Ubuntu | =20.04 | |
Thunderbird | <68.8 | 68.8 |
Firefox | <76 | 76 |
Firefox ESR | <68.8 | 68.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-12392 has been classified as a moderate severity vulnerability.
To fix CVE-2020-12392, users should update to the latest version of Firefox or Thunderbird that exceeds the affected versions listed.
CVE-2020-12392 affects Mozilla Firefox ESR, Mozilla Thunderbird, and certain versions of Firefox.
CVE-2020-12392 is a security flaw related to improper handling of HTTP POST data in the 'Copy as cURL' feature of browser devtools.
Exploiting CVE-2020-12392 could potentially lead to the disclosure of sensitive information if a user inadvertently runs a pasted curl command.