Bug 1801918 (CVE-2020-6798) - CVE-2020-6798 Mozilla: Incorrect parsing of template tag could result in JavaScript injection
Summary: CVE-2020-6798 Mozilla: Incorrect parsing of template tag could result in Java...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2020-6798
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1798931 1798932 1798933 1798934 1798935 1798936 1801946 1801947 1801948 1801949 1801950 1801951
Blocks: 1798927
TreeView+ depends on / blocked
 
Reported: 2020-02-11 22:41 UTC by Doran Moppert
Modified: 2021-02-16 20:36 UTC (History)
4 users (show)

Fixed In Version: firefox 68.5, thunderbird 68.5
Doc Type: No Doc Update
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-02-17 14:13:12 UTC


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2020:0512 0 None None None 2020-02-17 08:30:04 UTC
Red Hat Product Errata RHSA-2020:0519 0 None None None 2020-02-17 09:54:22 UTC
Red Hat Product Errata RHSA-2020:0520 0 None None None 2020-02-17 12:36:44 UTC
Red Hat Product Errata RHSA-2020:0521 0 None None None 2020-02-17 12:21:30 UTC
Red Hat Product Errata RHSA-2020:0565 0 None None None 2020-02-20 22:15:38 UTC
Red Hat Product Errata RHSA-2020:0574 0 None None None 2020-02-24 12:31:49 UTC
Red Hat Product Errata RHSA-2020:0576 0 None None None 2020-02-24 12:48:59 UTC
Red Hat Product Errata RHSA-2020:0577 0 None None None 2020-02-24 12:16:48 UTC

Description Doran Moppert 2020-02-11 22:41:59 UTC
If a `<template>` tag was used in a `<select>` tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability as a result.



External Reference:

https://www.mozilla.org/en-US/security/advisories/mfsa2020-06/#CVE-2020-6798

Comment 1 Doran Moppert 2020-02-11 22:42:03 UTC
Acknowledgments:

Name: the Mozilla project
Upstream: terjanq

Comment 2 errata-xmlrpc 2020-02-17 08:30:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:0512 https://access.redhat.com/errata/RHSA-2020:0512

Comment 3 errata-xmlrpc 2020-02-17 09:54:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Via RHSA-2020:0519 https://access.redhat.com/errata/RHSA-2020:0519

Comment 4 errata-xmlrpc 2020-02-17 12:21:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2020:0521 https://access.redhat.com/errata/RHSA-2020:0521

Comment 5 errata-xmlrpc 2020-02-17 12:36:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:0520 https://access.redhat.com/errata/RHSA-2020:0520

Comment 6 Product Security DevOps Team 2020-02-17 14:13:12 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2020-6798

Comment 7 errata-xmlrpc 2020-02-20 22:15:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions

Via RHSA-2020:0565 https://access.redhat.com/errata/RHSA-2020:0565

Comment 8 errata-xmlrpc 2020-02-24 12:16:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2020:0577 https://access.redhat.com/errata/RHSA-2020:0577

Comment 9 errata-xmlrpc 2020-02-24 12:31:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2020:0574 https://access.redhat.com/errata/RHSA-2020:0574

Comment 10 errata-xmlrpc 2020-02-24 12:48:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2020:0576 https://access.redhat.com/errata/RHSA-2020:0576


Note You need to log in before you can comment on or make changes to this bug.