When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was the originating javascript: URL which could lead to spoofing attacks; it is now correctly the URL of the originating document. This vulnerability affects Firefox < 74.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mozilla
Published: 2020-03-25T21:13:32
Updated: 2024-08-04T09:11:05.026Z
Reserved: 2020-01-10T00:00:00
Link: CVE-2020-6808
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-03-25T22:15:12.560
Modified: 2024-11-21T05:36:13.210
Link: CVE-2020-6808
Redhat