First published: Tue Sep 22 2020(Updated: )
By exploiting an Open Redirect vulnerability on a website, an attacker could have spoofed the site displayed in the download file dialog to show the original site (the one suffering from the open redirect) rather than the site the file was actually downloaded from.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/firefox | 118.0.2-1 | |
debian/firefox-esr | 91.12.0esr-1~deb10u1 115.3.1esr-1~deb10u1 102.15.0esr-1~deb11u1 115.3.1esr-1~deb11u1 102.15.1esr-1~deb12u1 115.3.0esr-1~deb12u1 115.3.0esr-1 | |
debian/thunderbird | 1:91.12.0-1~deb10u1 1:115.3.1-1~deb10u1 1:102.13.1-1~deb11u1 1:115.3.1-1~deb11u1 1:102.15.1-1~deb12u1 1:115.3.1-1~deb12u1 1:115.3.1-1 | |
Thunderbird | <78.3 | 78.3 |
Firefox | <81.0 | |
Firefox ESR | <78.3 | |
Thunderbird | <78.3 | |
Debian | =9.0 | |
Debian | =10.0 | |
SUSE Linux | =15.1 | |
SUSE Linux | =15.2 | |
Firefox | <81 | 81 |
Firefox ESR | <78.3 | 78.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-15677 is classified as a moderate severity vulnerability.
To fix CVE-2020-15677, upgrade your Firefox, Firefox ESR, or Thunderbird to the specified remedied versions listed in the advisory.
CVE-2020-15677 affects Mozilla Firefox, Firefox ESR, and Thunderbird versions prior to the specified remediation versions.
Yes, CVE-2020-15677 can potentially lead to security risks such as phishing attacks by allowing an attacker to spoof the site in the download dialog.
CVE-2020-15677 was disclosed as part of Mozilla's advisory MFSA 2020-44.