vulnerability
Arch Linux: Access restriction bypass (CVE-2018-12370)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Oct 18, 2018 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Oct 18, 2018
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
In the Reader View of Firefox before 61.0, SameSite cookie protections are not checked on exiting. This allows for a payload to be triggered when Reader View is exited if loaded by a malicious site while Reader mode is active, bypassing CSRF protections.
Solution
arch-linux-upgrade-latest
References
- CVE-2018-12370
- https://attackerkb.com/topics/CVE-2018-12370
- URL-http://www.securitytracker.com/id/1041193
- URL-https://bugzilla.mozilla.org/show_bug.cgi?id=1456652
- URL-https://security.archlinux.org/ASA-201806-14
- URL-https://security.gentoo.org/glsa/201810-01
- URL-https://usn.ubuntu.com/3705-1/
- URL-https://www.mozilla.org/en-US/security/advisories/mfsa2018-15
- URL-https://www.mozilla.org/security/advisories/mfsa2018-15/
- CWE-352
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.