The nsCSPHostSrc::permits function in dom/security/nsCSPUtils.cpp in Mozilla Firefox before 40.0 does not implement the Content Security Policy Level 2 exceptions for the blob, data, and filesystem URL schemes during wildcard source-expression matching, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging unexpected policy-enforcement behavior.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1086999 | issue tracking |
http://www.ubuntu.com/usn/USN-2702-3 | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html | third party advisory vendor advisory |
http://www.mozilla.org/security/announce/2015/mfsa2015-91.html | vendor advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | third party advisory |
http://www.securitytracker.com/id/1033247 | vdb entry |
http://www.ubuntu.com/usn/USN-2702-2 | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-2702-1 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/201605-06 | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00015.html | third party advisory vendor advisory |