Show plain JSON{"acknowledgement": "Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Hafiizh as the original reporter.", "affected_release": [{"advisory": "RHSA-2023:7505", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "thunderbird-0:115.5.0-1.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7509", "cpe": "cpe:/o:redhat:enterprise_linux:7", "package": "firefox-0:115.5.0-1.el7_9", "product_name": "Red Hat Enterprise Linux 7", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7500", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "thunderbird-0:115.5.0-1.el8_9", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7508", "cpe": "cpe:/a:redhat:enterprise_linux:8", "package": "firefox-0:115.5.0-1.el8_9", "product_name": "Red Hat Enterprise Linux 8", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7502", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "thunderbird-0:115.5.0-1.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7547", "cpe": "cpe:/a:redhat:rhel_e4s:8.1", "package": "firefox-0:115.5.0-1.el8_1", "product_name": "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions", "release_date": "2023-11-28T00:00:00Z"}, {"advisory": "RHSA-2023:7573", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "firefox-0:115.5.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-11-29T00:00:00Z"}, {"advisory": "RHSA-2023:7574", "cpe": "cpe:/a:redhat:rhel_aus:8.2", "package": "thunderbird-0:115.5.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support", "release_date": "2023-11-29T00:00:00Z"}, {"advisory": "RHSA-2023:7573", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "firefox-0:115.5.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-11-29T00:00:00Z"}, {"advisory": "RHSA-2023:7574", "cpe": "cpe:/a:redhat:rhel_tus:8.2", "package": "thunderbird-0:115.5.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service", "release_date": "2023-11-29T00:00:00Z"}, {"advisory": "RHSA-2023:7573", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "firefox-0:115.5.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-11-29T00:00:00Z"}, {"advisory": "RHSA-2023:7574", "cpe": "cpe:/a:redhat:rhel_e4s:8.2", "package": "thunderbird-0:115.5.0-1.el8_2", "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions", "release_date": "2023-11-29T00:00:00Z"}, {"advisory": "RHSA-2023:7569", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "firefox-0:115.5.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2023-11-29T00:00:00Z"}, {"advisory": "RHSA-2023:7570", "cpe": "cpe:/a:redhat:rhel_aus:8.4", "package": "thunderbird-0:115.5.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support", "release_date": "2023-11-29T00:00:00Z"}, {"advisory": "RHSA-2023:7569", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "firefox-0:115.5.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2023-11-29T00:00:00Z"}, {"advisory": "RHSA-2023:7570", "cpe": "cpe:/a:redhat:rhel_tus:8.4", "package": "thunderbird-0:115.5.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service", "release_date": "2023-11-29T00:00:00Z"}, {"advisory": "RHSA-2023:7569", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "firefox-0:115.5.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2023-11-29T00:00:00Z"}, {"advisory": "RHSA-2023:7570", "cpe": "cpe:/a:redhat:rhel_e4s:8.4", "package": "thunderbird-0:115.5.0-1.el8_4", "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions", "release_date": "2023-11-29T00:00:00Z"}, {"advisory": "RHSA-2023:7503", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "thunderbird-0:115.5.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7512", "cpe": "cpe:/a:redhat:rhel_eus:8.6", "package": "firefox-0:115.5.0-1.el8_6", "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7504", "cpe": "cpe:/a:redhat:rhel_eus:8.8", "package": "thunderbird-0:115.5.0-1.el8_8", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7511", "cpe": "cpe:/a:redhat:rhel_eus:8.8", "package": "firefox-0:115.5.0-1.el8_8", "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7501", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "thunderbird-0:115.5.0-1.el9_3", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7507", "cpe": "cpe:/a:redhat:enterprise_linux:9", "package": "firefox-0:115.5.0-1.el9_3", "product_name": "Red Hat Enterprise Linux 9", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7506", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "thunderbird-0:115.5.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7510", "cpe": "cpe:/a:redhat:rhel_eus:9.0", "package": "firefox-0:115.5.0-1.el9_0", "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7499", "cpe": "cpe:/a:redhat:rhel_eus:9.2", "package": "thunderbird-0:115.5.0-1.el9_2", "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "release_date": "2023-11-27T00:00:00Z"}, {"advisory": "RHSA-2023:7577", "cpe": "cpe:/a:redhat:rhel_eus:9.2", "package": "firefox-0:115.5.0-1.el9_2", "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support", "release_date": "2023-11-29T00:00:00Z"}], "bugzilla": {"description": "Mozilla: Clickjacking permission prompts using the fullscreen transition", "id": "2250898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250898"}, "csaw": false, "cvss3": {"cvss3_base_score": "7.5", "cvss3_scoring_vector": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "status": "verified"}, "cwe": "CWE-1021", "details": ["The black fade animation when exiting fullscreen is roughly the length of the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.", "The Mozilla Foundation Security Advisory describes this flaw as:\nThe black fade animation when exiting fullscreen is roughly\nthe length of the anti-clickjacking delay on permission prompts.\nIt was possible to use this fact to surprise users by luring them\nto click where the permission grant button would be about to appear."], "name": "CVE-2023-6206", "package_state": [{"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "firefox", "product_name": "Red Hat Enterprise Linux 6"}, {"cpe": "cpe:/o:redhat:enterprise_linux:6", "fix_state": "Out of support scope", "package_name": "thunderbird", "product_name": "Red Hat Enterprise Linux 6"}], "public_date": "2023-11-21T00:00:00Z", "references": ["https://www.cve.org/CVERecord?id=CVE-2023-6206\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-6206\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-50/#CVE-2023-6206\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2023-52/#CVE-2023-6206"], "statement": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.", "threat_severity": "Important"}