CVE-2018-12399 PUBLISHED

When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63.

EPSS 0.41% · 60.9th percentile

Risk Scores

EPSS Score
0.41%
60.9th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSmozjs5252.9.1-0ubuntu0.18.04.1, 52.8.1-0ubuntu0.18.04.1, 52.3.1-7fakesync1
Ubuntu:14.04:LTSfirefox28.0+build2-0ubuntu1, 28.0+build2-0ubuntu2, 29.0+build1-0ubuntu0.14.04.2
Ubuntu:18.04:LTSfirefox60.0+build2-0ubuntu1, 60.0.1+build2-0ubuntu0.18.04.1, 60.0.2+build1-0ubuntu0.18.04.1
Ubuntu:16.04:LTSfirefox51.0.1+build2-0ubuntu0.16.04.2, 52.0+build2-0ubuntu0.16.04.1, 52.0.1+build2-0ubuntu0.16.04.1
Ubuntu:20.04:LTSmozjs520, 52.9.1-1build1, 52.9.1-1ubuntu3
Ubuntu:18.04:LTSmozjs380, 38.8.0~repack1-0ubuntu4, 38.8.0~repack1-0ubuntu1

Timeline

References

Open in Interactive Console →