Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox < 68.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2019-21/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1556230 | vendor advisory issue tracking permissions required |
https://security.gentoo.org/glsa/201908-12 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html | vendor advisory mailing list third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html | vendor advisory mailing list third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html | vendor advisory mailing list third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html | vendor advisory mailing list third party advisory |