First published: Tue Oct 20 2020(Updated: )
When a link to an external protocol was clicked, a prompt was presented that allowed the user to choose what application to open it in. An attacker could induce that prompt to be associated with an origin they didn't control, resulting in a spoofing attack. This was fixed by changing external protocol prompts to be tab-modal while also ensuring they could not be incorrectly associated with a different origin.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <82 | 82 |
<82 | 82 | |
Mozilla Firefox | <82.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2020-15682.
The severity of CVE-2020-15682 is low.
When a link to an external protocol is clicked, a prompt is presented that allows the user to choose what application to open it in. An attacker can induce that prompt to be associated with an origin they don't control, resulting in a spoofing attack.
Mozilla Firefox versions up to exclusive 82 are affected by CVE-2020-15682.
CVE-2020-15682 was fixed by changing external protocol handling in Mozilla Firefox.