The 'Copy Image Link' context menu action would copy the final image URL after redirects. By embedding an image that triggered authentication flows - in conjunction with a Content Security Policy that stopped a redirection chain in the middle - the final image URL could be one that contained an authentication token used to takeover a user account. If a website tricked a user into copy and pasting the image link back to the page, the page would be able to steal the authentication tokens. This was fixed by making the action return the original URL, before any redirects. This vulnerability affects Firefox < 94.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1719203 | Issue Tracking Permissions Required Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2021-48/ | Vendor Advisory |
Configurations
Information
Published : 2021-12-08 14:15
Updated : 2021-12-10 08:54
NVD link : CVE-2021-43532
Mitre link : CVE-2021-43532
JSON object : View
CWE
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
Products Affected
mozilla
- firefox