Lucene search

K
mozillaMozilla FoundationMFSA2015-110
HistorySep 22, 2015 - 12:00 a.m.

Dragging and dropping images exposes final URL after redirects — Mozilla

2015-09-2200:00:00
Mozilla Foundation
www.mozilla.org
21

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.006 Low

EPSS

Percentile

79.0%

Security researcher Mario Gomes reported that when a previously loaded image on a page is drag and dropped into content after a redirect, the redirected URL is available to scripts. This is a violation of the Fetch specification’s defined behavior for “Atomic HTTP redirect handling” which states that redirected URLs are not exposed to any APIs. This can allow for information leakage.

Affected configurations

Vulners
Node
mozillafirefoxRange<41
OR
mozillafirefox_esrRange<38.3
OR
mozillafirefox_osRange<2.5
OR
mozillaseamonkeyRange<2.38
OR
mozillathunderbirdRange<38.3

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.006 Low

EPSS

Percentile

79.0%