Even when an iframe was sandboxed with <code>allow-top-navigation-by-user-activation</code>, if it received a redirect header to an external protocol the browser would process the redirect and prompt the user as appropriate. This vulnerability affects Firefox < 102.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2022-24/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1677138 | vendor advisory issue tracking permissions required |