Lucene search

K
mozillaMozilla FoundationMFSA2015-91
HistoryAug 11, 2015 - 12:00 a.m.

Mozilla Content Security Policy allows for asterisk wildcards in violation of CSP specification — Mozilla

2015-08-1100:00:00
Mozilla Foundation
www.mozilla.org
21

0.003 Low

EPSS

Percentile

65.6%

Mozilla security engineer Christoph Kerschbaumer reported a discrepancy in Mozilla’s implementation of Content Security Policy and the CSP specification. The specification states that blob:, data:, and filesystem: URLs should be excluded in case of a wildcard when matching source expressions but Mozilla’s implementation allows these in the case of an asterisk wildcard. This could allow for more permissive CSP usage than expected by a web developer, possibly allowing for cross-site scripting (XSS) attacks.

CPENameOperatorVersion
firefoxlt40
seamonkeylt2.38