First published: Tue Aug 25 2020(Updated: )
By holding a reference to the eval() function from an about:blank window, a malicious webpage could have gained access to the InstallTrigger object which would allow them to prompt the user to install an extension. Combined with user confusion, this could result in an unintended or malicious extension being installed.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <78.2 | 78.2 |
Mozilla Firefox ESR | <68.12 | 68.12 |
Mozilla Thunderbird | <68.12 | 68.12 |
Mozilla Thunderbird | <78.2 | 78.2 |
All of | ||
Mozilla Firefox | =80 | |
Google Android | ||
Mozilla Firefox | <80 | 80 |
Mozilla Firefox | <80.0 | |
Mozilla Firefox | <80.0 | |
Mozilla Firefox ESR | <68.12 | |
Mozilla Firefox ESR | >=78.0<78.2 | |
Mozilla Thunderbird | <68.12 | |
Mozilla Thunderbird | >=78.0<78.2 | |
Mozilla Firefox | >=78.0<78.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2020-15664 is a vulnerability that allowed a malicious webpage to gain access to the InstallTrigger object and prompt the user to install an extension.
Mozilla Thunderbird versions up to 78.2, Thunderbird versions up to 68.12, Mozilla Firefox versions up to 80, Mozilla Firefox ESR versions up to 78.2, and Mozilla Firefox ESR versions up to 68.12 are affected by CVE-2020-15664.
The severity of CVE-2020-15664 is high with a severity value of 6.5.
To fix CVE-2020-15664, it is recommended to update to the patched versions of the affected software.
You can find more information about CVE-2020-15664 on the Mozilla Bugzilla and Mozilla Security Advisories websites.