First published: Tue Nov 17 2020(Updated: )
A parsing and event loading mismatch in Firefox's SVG code could have allowed load events to fire, even after sanitization. An attacker already capable of exploiting an XSS vulnerability in privileged internal pages could have used this attack to bypass our built-in sanitizer.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <78.5 | 78.5 |
<83 | 83 | |
<78.5 | 78.5 | |
<78.5 | 78.5 | |
Mozilla Firefox | <83.0 | |
Mozilla Firefox ESR | <78.5 | |
Mozilla Thunderbird | <78.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-26951 is a vulnerability in Thunderbird's SVG code that could allow load events to fire, even after sanitization.
CVE-2020-26951 affects Mozilla Firefox ESR versions up to 78.5, Mozilla Thunderbird version up to 78.5, and Mozilla Firefox versions up to 83.
CVE-2020-26951 has a severity rating of 7 (high).
An attacker who can exploit an XSS vulnerability in privileged internal pages can use CVE-2020-26951 to bypass the built-in sanitizer.
CVE-2020-26951 is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation).