CVE-2020-6808 PUBLISHED

When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was the originating javascript: URL which could lead to spoofing attacks; it is now correctly the URL of the originating document. This vulnerability affects Firefox < 74.

EPSS 0.36% · 57.7th percentile

Risk Scores

EPSS Score
0.36%
57.7th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSmozjs520, 52.3.1-0ubuntu3, 52.3.1-7fakesync1
Ubuntu:20.04:LTSfirefox74.0+build2-0ubuntu1, 73.0+build3-0ubuntu1, 73.0.1+build1-0ubuntu1
Ubuntu:20.04:LTSmozjs5252.9.1-1build1, 0, 52.9.1-1ubuntu3
Ubuntu:18.04:LTSfirefox66.0.5+build1-0ubuntu0.18.04.1, 67.0+build2-0ubuntu0.18.04.1, 67.0.1+build1-0ubuntu0.18.04.1
Ubuntu:18.04:LTSmozjs3838.8.0~repack1-0ubuntu4, 38.8.0~repack1-0ubuntu3, 38.8.0~repack1-0ubuntu1
Ubuntu:16.04:LTSfirefox69.0+build2-0ubuntu0.16.04.4, 69.0.1+build1-0ubuntu0.16.04.1, 69.0.2+build1-0ubuntu0.16.04.1

Timeline

References

Open in Interactive Console →