Response header name interning does not have same-origin protections and these headers are stored in a global registry. This allows stored header names to be available cross-origin. This vulnerability affects Firefox < 55.
The product does not properly verify that the source of data or communication is valid.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1334776 | issue tracking exploit patch |
https://www.mozilla.org/security/advisories/mfsa2017-18/ | vendor advisory |
http://www.securitytracker.com/id/1039124 | vdb entry third party advisory |