4.3
CVSSv3

CVE-2018-12399

Published: 28/02/2019 Updated: 01/03/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 4.3 | Impact Score: 1.4 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mozilla firefox

canonical ubuntu linux 14.04

canonical ubuntu linux 18.04

canonical ubuntu linux 16.04

canonical ubuntu linux 18.10

Vendor Advisories

Firefox could be made to crash or run programs as your login if it opened a malicious website ...
USN-3801-1 caused some minor regressions in Firefox ...
Mozilla Foundation Security Advisory 2018-26 Security vulnerabilities fixed in Firefox 63 Announced October 23, 2018 Impact critical Products Firefox Fixed in Firefox 63 ...
A security issue has been found in Firefox versions prior to 630, where when a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol This may result in the user approving a protocol handler that they otherwise would not have ...