Vulnerability Description
Because Firefox did not implement the <code>unsafe-hashes</code> CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 108.0 |
Related Weaknesses (CWE)
References
- https://bugzilla.mozilla.org/show_bug.cgi?id=1644790Issue Tracking
- https://security.gentoo.org/glsa/202305-06
- https://www.mozilla.org/security/advisories/mfsa2022-51/Vendor Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=1644790Issue Tracking
- https://security.gentoo.org/glsa/202305-06
- https://www.mozilla.org/security/advisories/mfsa2022-51/Vendor Advisory
FAQ
What is CVE-2022-46873?
CVE-2022-46873 is a vulnerability with a CVSS score of 8.8 (HIGH). Because Firefox did not implement the <code>unsafe-hashes</code> CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been abl...
How severe is CVE-2022-46873?
CVE-2022-46873 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-46873?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox.