CVE-2021-23972 PUBLISHED

One phishing tactic on the web is to provide a link with HTTP Auth. For example 'https://www.phishingtarget.com@evil.com'. To mitigate this type of attack, Firefox will display a warning dialog; however, this warning dialog would not have been displayed if evil.com used a redirect that was cached by the browser. This vulnerability affects Firefox < 86.

EPSS 0.41% · 60.9th percentile

Risk Scores

EPSS Score
0.41%
60.9th percentile

Affected Products

VendorProductVersions
Ubuntu:18.04:LTSfirefox0, 56.0+build6-0ubuntu1, 57.0.1+build2-0ubuntu1
Ubuntu:22.04:LTSmozjs7878.15.0-4ubuntu1, 78.15.0-2, 78.13.0-1
Ubuntu:18.04:LTSmozjs3838.8.0~repack1-0ubuntu4, 0, 38.8.0~repack1-0ubuntu1
Ubuntu:16.04:LTSfirefox69.0.2+build1-0ubuntu0.16.04.1, 70.0+build2-0ubuntu0.16.04.1, 70.0.1+build1-0ubuntu0.16.04.1
Ubuntu:18.04:LTSmozjs5252.9.1-0ubuntu0.18.04.1, 0, 52.3.1-0ubuntu3
Ubuntu:20.04:LTSmozjs6868.6.0-1ubuntu1, 0, 68.5.0-1~fakesync
Ubuntu:20.04:LTSfirefox73.0+build1-0ubuntu1, 73.0+build2-0ubuntu1, 73.0+build3-0ubuntu1
Ubuntu:20.04:LTSmozjs5252.9.1-1ubuntu3, 52.9.1-1build1, 0

Timeline

References

Open in Interactive Console →