When a page's content security policy (CSP) header contains a "sandbox" directive, other directives are ignored. This results in the incorrect enforcement of CSP. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2017-19/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2017-20/ | vendor advisory |
https://www.debian.org/security/2017/dsa-3968 | third party advisory vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2017-18/ | vendor advisory |
https://access.redhat.com/errata/RHSA-2017:2456 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/100234 | vdb entry third party advisory |
https://access.redhat.com/errata/RHSA-2017:2534 | third party advisory vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1377426 | issue tracking exploit patch |
http://www.securitytracker.com/id/1039124 | vdb entry third party advisory |
https://security.gentoo.org/glsa/201803-14 | third party advisory vendor advisory |
https://www.debian.org/security/2017/dsa-3928 | third party advisory vendor advisory |