CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
54.8%
JavaScript can be injected into an exported bookmarks file by placing
JavaScript code into user-supplied tags in saved bookmarks. If the
resulting exported HTML file is later opened in a browser this JavaScript
will be executed. This could be used in social engineering and
self-cross-site-scripting (self-XSS) attacks if users were convinced to add
malicious tags to bookmarks, export them, and then open the resulting file.
This vulnerability affects Firefox < 57.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 17.10 | noarch | firefox | < 57.0+build4-0ubuntu0.17.10.5 | UNKNOWN |
ubuntu | 18.04 | noarch | firefox | < 57.0.1+build2-0ubuntu1 | UNKNOWN |
ubuntu | 14.04 | noarch | firefox | < 57.0+build4-0ubuntu0.14.04.4 | UNKNOWN |
ubuntu | 16.04 | noarch | firefox | < 57.0+build4-0ubuntu0.16.04.5 | UNKNOWN |
ubuntu | 17.04 | noarch | firefox | < 57.0+build4-0ubuntu0.17.04.5 | UNKNOWN |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
54.8%