When network partitioning was enabled, e.g. as a result of Enhanced Tracking Protection settings, a TLS error page would allow the user to override an error on a domain which had specified HTTP Strict Transport Security (which implies that the error should not be override-able.) This issue did not affect the network connections, and they were correctly upgraded to HTTPS automatically. This vulnerability affects Firefox < 90.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1704843 | Issue Tracking Vendor Advisory |
https://security.gentoo.org/glsa/202202-03 | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2021-28/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1704843 | Issue Tracking Vendor Advisory |
https://security.gentoo.org/glsa/202202-03 | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2021-28/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1704843 - Issue Tracking, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/202202-03 - Third Party Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2021-28/ - Vendor Advisory |
Information
Published : 2021-08-05 20:15
Updated : 2024-11-21 06:02
NVD link : CVE-2021-29974
Mitre link : CVE-2021-29974
CVE.ORG link : CVE-2021-29974
JSON object : View
Products Affected
mozilla
- firefox
CWE