CVE-2020-15680 PUBLISHED

If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. This vulnerability affects Firefox < 82.

EPSS 0.32% · 54.8th percentile

Risk Scores

EPSS Score
0.32%
54.8th percentile

Affected Products

VendorProductVersions
Ubuntu:20.04:LTSmozjs520, 52.9.1-1ubuntu3, 52.9.1-1build1
Ubuntu:20.04:LTSfirefox70.0+build2-0ubuntu1, 69.0.3+build1-0ubuntu1, 0
Ubuntu:20.04:LTSmozjs6868.6.0-1, 68.6.0-1ubuntu1, 68.5.0-2~fakesync
Ubuntu:18.04:LTSmozjs3838.8.0~repack1-0ubuntu4, 38.8.0~repack1-0ubuntu3, 38.8.0~repack1-0ubuntu1
Ubuntu:18.04:LTSmozjs520, 52.3.1-0ubuntu3, 52.9.1-0ubuntu0.18.04.1
Ubuntu:18.04:LTSfirefox67.0.3+build1-0ubuntu0.18.04.1, 0, 56.0+build6-0ubuntu1
Ubuntu:16.04:LTSfirefox42.0+build2-0ubuntu1, 41.0.2+build2-0ubuntu1, 60.0.2+build1-0ubuntu0.16.04.1

Timeline

References

Open in Interactive Console →