First published: Tue Sep 22 2020(Updated: )
Firefox sometimes ran the onload handler for SVG elements that the DOM sanitizer decided to remove, resulting in JavaScript being executed after pasting attacker-controlled data into a contenteditable element.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/firefox | 118.0.2-1 | |
debian/firefox-esr | 91.12.0esr-1~deb10u1 115.3.1esr-1~deb10u1 102.15.0esr-1~deb11u1 115.3.1esr-1~deb11u1 102.15.1esr-1~deb12u1 115.3.0esr-1~deb12u1 115.3.0esr-1 | |
debian/thunderbird | 1:91.12.0-1~deb10u1 1:115.3.1-1~deb10u1 1:102.13.1-1~deb11u1 1:115.3.1-1~deb11u1 1:102.15.1-1~deb12u1 1:115.3.1-1~deb12u1 1:115.3.1-1 | |
Thunderbird | <78.3 | 78.3 |
Firefox | <81.0 | |
Firefox ESR | <78.3 | |
Thunderbird | <78.3 | |
Debian | =9.0 | |
Debian | =10.0 | |
SUSE Linux | =15.1 | |
SUSE Linux | =15.2 | |
Firefox | <81 | 81 |
Firefox ESR | <78.3 | 78.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-15676 is classified as a high severity vulnerability due to potential arbitrary code execution.
To fix CVE-2020-15676, update Firefox to version 118.0.2-1 or later, or update Firefox ESR and Thunderbird as specified in the advisory.
Versions of Firefox prior to 118.0.2-1 are affected by CVE-2020-15676.
Yes, specific versions of Firefox ESR including those prior to and including 78.3 are affected by CVE-2020-15676.
Yes, CVE-2020-15676 can be exploited when pasting attacker-controlled data into contenteditable elements.