First published: Tue Mar 10 2020(Updated: )
Last updated 24 July 2024
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <68.6 | 68.6 |
Mozilla Thunderbird | <68.6 | 68.6 |
redhat/firefox | <68.6 | 68.6 |
redhat/thunderbird | <68.6 | 68.6 |
Mozilla Firefox | <74 | 74 |
Mozilla Firefox | <74.0 | |
Mozilla Firefox ESR | <68.6.0 | |
Mozilla Thunderbird | <68.6.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =19.10 | |
debian/firefox | 131.0.3-1 | |
debian/firefox-esr | 115.14.0esr-1~deb11u1 128.3.1esr-1~deb11u1 115.14.0esr-1~deb12u1 128.3.1esr-1~deb12u1 128.3.1esr-2 | |
debian/thunderbird | 1:115.12.0-1~deb11u1 1:115.16.0esr-1~deb11u1 1:115.12.0-1~deb12u1 1:115.16.0esr-1~deb12u1 1:128.3.2esr-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-6811 is a vulnerability in Mozilla Firefox and Thunderbird that allows command injection and arbitrary command execution.
CVE-2020-6811 works by not properly escaping the HTTP method of a request in the 'Copy as cURL' feature of Devtools' network tab.
Mozilla Firefox (up to version 74), Thunderbird (up to version 68.6), and Firefox ESR (up to version 68.6) are affected by CVE-2020-6811.
The severity of CVE-2020-6811 is rated as medium.
To fix CVE-2020-6811, update Mozilla Firefox to version 75 or later, Thunderbird to version 68.7 or later, or Firefox ESR to version 68.7 or later.