FreeBSD : firefox -- Cross-origin restriction bypass using Fetch (79c68ef7-c8ae-4ade-91b4-4b8221b7c72a)

medium Nessus Plugin ID 86432

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Firefox Developers report :

Security researcher Abdulrahman Alqabandi reported that the fetch() API did not correctly implement the Cross-Origin Resource Sharing (CORS) specification, allowing a malicious page to access private data from other origins. Mozilla developer Ben Kelly independently reported the same issue.

Solution

Update the affected packages.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2015-115/

http://www.nessus.org/u?0d908117

Plugin Details

Severity: Medium

ID: 86432

File Name: freebsd_pkg_79c68ef7c8ae4ade91b44b8221b7c72a.nasl

Version: 2.8

Type: local

Published: 10/19/2015

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:firefox, p-cpe:/a:freebsd:freebsd:linux-firefox, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 10/16/2015

Vulnerability Publication Date: 10/15/2015

Reference Information

CVE: CVE-2015-7184