An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the `resource://pdf.js` origin. This could allow them to access cross-origin PDF content. This access is limited to "same site" documents by the Site Isolation feature on desktop clients, but full cross-origin access is possible on Android versions. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Firefox ESR < 115.16, Thunderbird < 128.3, and Thunderbird < 131.
The product does not properly verify that the source of data or communication is valid.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1918301 | permissions required |
https://www.mozilla.org/security/advisories/mfsa2024-46/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2024-47/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2024-48/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2024-49/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2024-50/ | vendor advisory |