If a valid external protocol handler was referenced in an image tag, the resulting broken image size could be distinguished from a broken image size of a non-existent protocol handler. This allowed an attacker to successfully probe whether an external protocol handler was registered. This vulnerability affects Firefox < 82.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2020-45/ | release notes vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1658881 | vendor advisory issue tracking permissions required |