发布时间: 2023年9月22日
修改时间: 2024年11月1日
One phishing tactic on the web is to provide a link with HTTP Auth. For example 'https://www.phishingtarget.com@evil.com'. To mitigate this type of attack, Firefox will display a warning dialog; however, this warning dialog would not have been displayed if evil.com used a redirect that was cached by the browser. This vulnerability affects Firefox < 86.
NVD | openEuler | |
---|---|---|
CVSS评分 | 8.8 | 8.8 |
Attack Vector | Network | Network |
Attack Complexity | Low | Low |
Privileges Required | None | None |
User Interaction | Required | Required |
Scope | Unchanged | Unchanged |
Confidentiality | High | High |
Integrity | High | High |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1982 | firefox security update | 2023年9月22日 |
KylinSec-SA-2023-2275 | firefox security update | 2023年9月22日 |
KylinSec-SA-2024-4141 | firefox security update | 2024年11月1日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-5A | firefox | Fixed |
KY3.5.1 | firefox | Fixed |
KY3.5.2 | firefox | Fixed |