The Reader View implementation in Mozilla Firefox before 42.0 has an improper whitelist, which makes it easier for remote attackers to bypass the Content Security Policy (CSP) protection mechanism and conduct cross-site scripting (XSS) attacks via vectors involving SVG animations and the about:reader URL.
References
Configurations
History
21 Nov 2024, 02:31
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00015.html - | |
References | () http://www.mozilla.org/security/announce/2015/mfsa2015-118.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - | |
References | () http://www.securitytracker.com/id/1034069 - | |
References | () http://www.ubuntu.com/usn/USN-2785-1 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1136692 - | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1182778 - | |
References | () https://security.gentoo.org/glsa/201512-10 - |
Information
Published : 2015-11-05 05:59
Updated : 2024-11-21 02:31
NVD link : CVE-2015-4518
Mitre link : CVE-2015-4518
CVE.ORG link : CVE-2015-4518
JSON object : View
Products Affected
mozilla
- firefox
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')