The 'Copy Image Link' context menu action would copy the final image URL after redirects. By embedding an image that triggered authentication flows - in conjunction with a Content Security Policy that stopped a redirection chain in the middle - the final image URL could be one that contained an authentication token used to takeover a user account. If a website tricked a user into copy and pasting the image link back to the page, the page would be able to steal the authentication tokens. This was fixed by making the action return the original URL, before any redirects. This vulnerability affects Firefox < 94.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1719203 | Issue Tracking Permissions Required Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2021-48/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1719203 | Issue Tracking Permissions Required Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2021-48/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:29
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=1719203 - Issue Tracking, Permissions Required, Vendor Advisory | |
References | () https://www.mozilla.org/security/advisories/mfsa2021-48/ - Vendor Advisory |
Information
Published : 2021-12-08 22:15
Updated : 2024-11-21 06:29
NVD link : CVE-2021-43532
Mitre link : CVE-2021-43532
CVE.ORG link : CVE-2021-43532
JSON object : View
Products Affected
mozilla
- firefox
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')