5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
33.7%
When a user loaded a Web Extensions context menu, the Web Extension could
access the post-redirect URL of the element clicked. If the Web Extension
lacked the WebRequest permission for the hosts involved in the redirect,
this would be a same-origin-violation leaking data the Web Extension should
have access to. This was fixed to provide the pre-redirect URL. This is
related to CVE-2021-43532 but in the context of Web Extensions. This
vulnerability affects Firefox < 94.
Author | Note |
---|---|
tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
bugzilla.mozilla.org/show_bug.cgi?id=1659155
launchpad.net/bugs/cve/CVE-2021-43531
nvd.nist.gov/vuln/detail/CVE-2021-43531
security-tracker.debian.org/tracker/CVE-2021-43531
www.cve.org/CVERecord?id=CVE-2021-43531
www.mozilla.org/en-US/security/advisories/mfsa2021-48/#CVE-2021-43531
www.mozilla.org/security/advisories/mfsa2021-48/
5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
33.7%