Firefox < 41.0.2 'fetch' API Cross-Origin Bypass

medium Nessus Plugin ID 86418

Synopsis

The remote Windows host contains a web browser that is affected by a cross-origin restriction bypass vulnerability.

Description

The version of Firefox installed on the remote Windows host is prior to 41.0.2. It is, therefore, affected by a cross-origin restriction bypass vulnerability in the fetch() API due to an incorrect implementation of the Cross-Origin Resource Sharing (CORS) specification. A remote attacker can exploit this, via a malicious website, to access private data from other origins.

Solution

Upgrade to Firefox 41.0.2 or later.

See Also

https://www.mozilla.org/en-US/security/advisories/mfsa2015-115/

Plugin Details

Severity: Medium

ID: 86418

File Name: mozilla_firefox_41_0_2.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 10/16/2015

Updated: 11/20/2019

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2015-7184

Vulnerability Information

CPE: cpe:/a:mozilla:firefox

Required KB Items: Mozilla/Firefox/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 10/15/2015

Vulnerability Publication Date: 10/15/2015

Reference Information

CVE: CVE-2015-7184