Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-11698 |
CWE-ID | CWE-451 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
firefox-esr (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU18563
Risk: Low
CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2019-11698
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of drag and drop operations. A remote attacker can create a specially crafted hyperlink that when dragged and dropped to the bookmark bar or sidebar and the resulting bookmark is subsequently dragged and dropped into the web content area, an arbitrary query of a user's browser history can be run and transmitted to the content page via drop
event data.
Successful exploitation of the vulnerability may allow an attacker to steal user's browser history.
MitigationInstall update from vendor's website.
Vulnerable software versionsfirefox-esr (Alpine package): 60.4.0-r0 - 60.6.2-r0
CPE2.3https://git.alpinelinux.org/aports/commit/?id=19d91779a5cd79292c972f6acdf04ef87ed7379e
https://git.alpinelinux.org/aports/commit/?id=5d004d13d3cfbb28cda2846e1c88900d5a8d1040
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.