Mozilla Firefox before 46.0 allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via the multipart/x-mixed-replace content type.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html | vendor advisory |
http://www.securitytracker.com/id/1035692 | vdb entry |
http://www.mozilla.org/security/announce/2016/mfsa2016-45.html | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2016-05/msg00038.html | vendor advisory |
http://www.ubuntu.com/usn/USN-2936-2 | vendor advisory |
https://security.gentoo.org/glsa/201701-15 | vendor advisory |
http://www.ubuntu.com/usn/USN-2936-1 | vendor advisory |
http://www.ubuntu.com/usn/USN-2936-3 | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1223743 |