FreeBSD : firefox -- Cross-origin restriction bypass using Fetch (79c68ef7-c8ae-4ade-91b4-4b8221b7c72a)

Medium Nessus Plugin ID 86432


The remote FreeBSD host is missing one or more security-related updates.


Firefox Developers report :

Security researcher Abdulrahman Alqabandi reported that the fetch() API did not correctly implement the Cross-Origin Resource Sharing (CORS) specification, allowing a malicious page to access private data from other origins. Mozilla developer Ben Kelly independently reported the same issue.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 86432

File Name: freebsd_pkg_79c68ef7c8ae4ade91b44b8221b7c72a.nasl

Version: $Revision: 2.5 $

Type: local

Published: 2015/10/19

Modified: 2015/11/08

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:firefox, p-cpe:/a:freebsd:freebsd:linux-firefox, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2015/10/16

Vulnerability Publication Date: 2015/10/15

Reference Information

CVE: CVE-2015-7184