CVE-2024-11694

Source
https://cve.org/CVERecord?id=CVE-2024-11694
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-11694.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-11694
Downstream
Related
Published
2024-11-26T14:15:18.943Z
Modified
2026-03-11T13:46:41.729853Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP frame-src bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Thunderbird < 115.18.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "115.8.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "133.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "116.0"
            },
            {
                "fixed": "128.5.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "115.18.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "116.0"
            },
            {
                "fixed": "128.5.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "129.0"
            },
            {
                "fixed": "133.0"
            }
        ]
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-11694.json"