Lucene search

K
mozillaMozilla FoundationMFSA2015-91
HistoryAug 11, 2015 - 12:00 a.m.

Mozilla Content Security Policy allows for asterisk wildcards in violation of CSP specification — Mozilla

2015-08-1100:00:00
Mozilla Foundation
www.mozilla.org
25

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.003 Low

EPSS

Percentile

65.8%

Mozilla security engineer Christoph Kerschbaumer reported a discrepancy in Mozilla’s implementation of Content Security Policy and the CSP specification. The specification states that blob:, data:, and filesystem: URLs should be excluded in case of a wildcard when matching source expressions but Mozilla’s implementation allows these in the case of an asterisk wildcard. This could allow for more permissive CSP usage than expected by a web developer, possibly allowing for cross-site scripting (XSS) attacks.

Affected configurations

Vulners
Node
mozillafirefoxRange<40
OR
mozillaseamonkeyRange<2.38
CPENameOperatorVersion
firefoxlt40
seamonkeylt2.38

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.003 Low

EPSS

Percentile

65.8%