SB20200310132 - Input validation error in firefox-esr (Alpine package)
Published: March 10, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2020-6811)
The vulnerability allows a remote attacker to execute arbitrary OS commands.
The vulnerability exists due to insufficient validation of user-supplied input copied into buffer via the 'Copy as cURL' feature of Devtools' network tab. A remote attacker can trick the victim into using the 'Copy as cURL' feature to copy malicious data into buffer and later insert them into a terminal window.
Successful exploitation of the vulnerability may result in OS command execution.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=559ca01ce273111fa46352af60e88d74c657c7f5
- https://git.alpinelinux.org/aports/commit/?id=1d258f723c31c630b8159e94a980ef430a9ea27b
- https://git.alpinelinux.org/aports/commit/?id=82e6adffb8c262ce3e9453fbbe8e7fd2406bc48f
- https://git.alpinelinux.org/aports/commit/?id=a16f83f7141a8f92c825dbe6822ff641ad8fa846
- https://git.alpinelinux.org/aports/commit/?id=672f75ca5f5562f95ab35778287af25da1b99013