Vulnerability Description
Mozilla Firefox before 48.0 mishandles changes from 'INPUT type="password"' to 'INPUT type="text"' within a single Session Manager session, which might allow attackers to discover cleartext passwords by reading a session restoration file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | <= 47.0.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-74.htmlVendor Advisory
- http://www.securityfocus.com/bid/92260
- http://www.securitytracker.com/id/1036508
- http://www.ubuntu.com/usn/USN-3044-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1280294Issue TrackingPermissions Required
- https://security.gentoo.org/glsa/201701-15
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-74.htmlVendor Advisory
- http://www.securityfocus.com/bid/92260
- http://www.securitytracker.com/id/1036508
- http://www.ubuntu.com/usn/USN-3044-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1280294Issue TrackingPermissions Required
FAQ
What is CVE-2016-5260?
CVE-2016-5260 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Mozilla Firefox before 48.0 mishandles changes from 'INPUT type="password"' to 'INPUT type="text"' within a single Session Manager session, which might allow attackers to discover cleartext passwords ...
How severe is CVE-2016-5260?
CVE-2016-5260 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-5260?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox.