一、漏洞信息
漏洞编号:CVE-2022-46873
漏洞归属组件:mozjs78
漏洞归属的版本:78.15.0,78.4.0,91.6.0
CVSS V3.0分值:
BaseScore:8.8 High
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
漏洞简述:
Because Firefox did not implement the unsafe-hashes
CSP directive, an attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject executable script. This would be severely constrained by the specified Content Security Policy of the document. This vulnerability affects Firefox < 108.
漏洞公开时间:2022-12-23 04:15:46
漏洞创建时间:2024-11-26 09:55:42
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2022-46873
漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
其它
漏洞补丁信息:
影响的包 | 修复版本 | 修复补丁 | 问题引入补丁 | 来源 |
---|---|---|---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1644790 | nvd | |||
https://www.mozilla.org/security/advisories/mfsa2022-51/ | nvd |
二、漏洞分析结构反馈
影响性分析说明:
openEuler评分:
受影响版本排查(受影响/不受影响):
1.master(91.6.0):
2.openEuler-20.03-LTS-SP4(78.4.0):
3.openEuler-22.03-LTS-SP1(91.6.0):
4.openEuler-22.03-LTS-SP3(91.6.0):
5.openEuler-22.03-LTS-SP4(91.6.0):
6.openEuler-24.03-LTS(91.6.0):
7.openEuler-24.03-LTS-Next(91.6.0):
8.openEuler-24.03-LTS-SP1:
修复是否涉及abi变化(是/否):
1.master(91.6.0):
2.openEuler-20.03-LTS-SP4(78.4.0):
3.openEuler-22.03-LTS-SP1(91.6.0):
4.openEuler-22.03-LTS-SP3(91.6.0):
5.openEuler-22.03-LTS-SP4(91.6.0):
6.openEuler-24.03-LTS(91.6.0):
7.openEuler-24.03-LTS-Next(91.6.0):
8.openEuler-24.03-LTS-SP1:
原因说明:
1.master(91.6.0):
2.openEuler-20.03-LTS-SP4(78.4.0):
3.openEuler-22.03-LTS-SP1(91.6.0):
4.openEuler-22.03-LTS-SP3(91.6.0):
5.openEuler-22.03-LTS-SP4(91.6.0):
6.openEuler-24.03-LTS(91.6.0):
7.openEuler-24.03-LTS-Next(91.6.0):
8.openEuler-24.03-LTS-SP1: