CVE-2022-46873

Source
https://cve.org/CVERecord?id=CVE-2022-46873
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-46873.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-46873
Downstream
Related
Withdrawn
2026-03-18T01:29:49.242936Z
Published
2022-12-22T20:15:46.027Z
Modified
2026-03-18T01:29:49.242936Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Because Firefox did not implement the <code>unsafe-hashes</code> CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108.

References

Affected packages

Git /

Affected ranges

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-46873.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "108.0"
            }
        ]
    }
]