Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-12394 |
CWE-ID | CWE-451 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
firefox (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU27537
Risk: Low
CVSSv3.1: 2.8 [CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-12394
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform spoofing attack.
The vulnerability exists due to a logic flaw in the location bar implementation. A local user can spoof the current location by selecting a different origin and removing focus from the input element.
MitigationInstall update from vendor's website.
Vulnerable software versionsfirefox (Alpine package): 70.0-r0 - 75.0-r2
External linkshttp://git.alpinelinux.org/aports/commit/?id=c9413fd0912a1f1e6cdc9e5fd25d15f4f22cc11a
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.