Firefox < 41.0.2 'fetch' API Cross-Origin Bypass (Mac OS X)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote Mac OS X host contains a web browser that is affected by
a cross-origin restriction bypass vulnerability.

Description :

The version of Firefox installed on the remote Mac OS X host is prior
to 41.0.2. It is, therefore, affected by a cross-origin restriction
bypass vulnerability in the fetch() API due to an incorrect
implementation of the Cross-Origin Resource Sharing (CORS)
specification. A remote attacker can exploit this, via a malicious
website, to access private data from other origins.

See also :

https://www.mozilla.org/en-US/security/advisories/mfsa2015-115/

Solution :

Upgrade to Firefox 41.0.2 or later.

Risk factor :

Medium / CVSS Base Score : 5.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false

Family: MacOS X Local Security Checks

Nessus Plugin ID: 86417 ()

Bugtraq ID:

CVE ID: CVE-2015-7184

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now