Show plain JSON{"acknowledgement": "Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Hafiizh as the original reporter.", "affected_release": [{"advisory": "RHSA-2024:0026", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "firefox-0:115.6.0-1.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2024-01-02T00:00:00Z"}, {"advisory": "RHSA-2024:0012", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "firefox-0:115.6.0-1.el8_9", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2024-01-02T00:00:00Z"}, {"advisory": "RHSA-2024:0023", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "firefox-0:115.6.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2024-01-02T00:00:00Z"}, {"advisory": "RHSA-2024:0023", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "firefox-0:115.6.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2024-01-02T00:00:00Z"}, {"advisory": "RHSA-2024:0023", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "firefox-0:115.6.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2024-01-02T00:00:00Z"}, {"advisory": "RHSA-2024:0021", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "firefox-0:115.6.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2024-01-02T00:00:00Z"}, {"advisory": "RHSA-2024:0021", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "firefox-0:115.6.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2024-01-02T00:00:00Z"}, {"advisory": "RHSA-2024:0021", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "firefox-0:115.6.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2024-01-02T00:00:00Z"}, {"advisory": "RHSA-2024:0024", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "firefox-0:115.6.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2024-01-02T00:00:00Z"}, {"advisory": "RHSA-2024:0011", "cpe": "cpe:/a:redhat:rhel_eus:8.8", "package": "firefox-0:115.6.0-1.el8_8", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2024-01-02T00:00:00Z"}, {"advisory": "RHSA-2024:0025", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "firefox-0:115.6.0-1.el9_3", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2024-01-02T00:00:00Z"}, {"advisory": "RHSA-2024:0022", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "firefox-0:115.6.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2024-01-02T00:00:00Z"}, {"advisory": "RHSA-2024:0019", "cpe": "cpe:/a:redhat:rhel_eus:9.2", "package": "firefox-0:115.6.0-1.el9_2", "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "release_date": "2024-01-02T00:00:00Z"}], "bugzilla": {"description": "Mozilla: Clickjacking permission prompts using the popup transition", "id": "2255366", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255366"}, "csaw": false, "cvss3": {"cvss3_base_score": "6.1", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "status": "verified"}, "cwe": "CWE-1021", "details": ["The timing of a button click causing a popup to disappear was approximately the same length as the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox ESR < 115.6 and Firefox < 121.", "The Mozilla Foundation Security Advisory describes this flaw as:\nThe timing of a button click causing a popup to disappear was approximately the same length as the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear."], "name": "CVE-2023-6867", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Not affected", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:7", "fix_state": "Not affected", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 7"}, {"cpe": "cpe:/o:redhat:enterprise_linux:8", "fix_state": "Not affected", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 8"}, {"cpe": "cpe:/o:redhat:enterprise_linux:9", "fix_state": "Not affected", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 9"}], "public_date": "2023-12-19T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-6867\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-6867\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-54/#CVE-2023-6867\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-55/#CVE-2023-6867"], "statement": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.", "threat_severity": "Moderate"}