CVE-2021-23969
As specified in the W3C Content Security Policy draft, when creating a violation report, "User agents need to ensure that the source file is the URL requested by the page, pre-redirects. If that’s not possible, user agents need to strip the URL down to an origin to avoid unintentional leakage." Under certain types of redirects, Firefox incorrectly set the source file to be the destination of the redirects. This was fixed to be the redirect destination's origin. This vulnerability affects Firefox < 86, Thunderbird < 78.8, and Firefox ESR < 78.8.
Published
2021-02-26T02:15:12.947
Last Modified
2024-11-21T05:52:07.350
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 4.3 (MEDIUM)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:P/I:N/A:N
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: NONE
- Availability Impact: NONE
Exploitability Score
8.6
Impact Score
2.9
Weaknesses
-
Type: Primary
NVD-CWE-noinfo
Affected Vendors & Products
References
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1542194
Issue Tracking, Permissions Required, Vendor Advisory
([email protected])
-
https://lists.debian.org/debian-lts-announce/2021/03/msg00000.html
Mailing List, Third Party Advisory
([email protected])
-
https://security.gentoo.org/glsa/202104-09
Third Party Advisory
([email protected])
-
https://security.gentoo.org/glsa/202104-10
Third Party Advisory
([email protected])
-
https://www.debian.org/security/2021/dsa-4866
Third Party Advisory
([email protected])
-
https://www.mozilla.org/security/advisories/mfsa2021-07/
Release Notes, Vendor Advisory
([email protected])
-
https://www.mozilla.org/security/advisories/mfsa2021-08/
Release Notes, Vendor Advisory
([email protected])
-
https://www.mozilla.org/security/advisories/mfsa2021-09/
Release Notes, Vendor Advisory
([email protected])
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1542194
Issue Tracking, Permissions Required, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://lists.debian.org/debian-lts-announce/2021/03/msg00000.html
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.gentoo.org/glsa/202104-09
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://security.gentoo.org/glsa/202104-10
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.debian.org/security/2021/dsa-4866
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.mozilla.org/security/advisories/mfsa2021-07/
Release Notes, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.mozilla.org/security/advisories/mfsa2021-08/
Release Notes, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.mozilla.org/security/advisories/mfsa2021-09/
Release Notes, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)