Firefox cached CORS preflight responses across IP address changes. This allowed circumventing CORS with DNS rebinding. This vulnerability affects Firefox < 141, Firefox ESR < 140.1, Thunderbird < 141, and Thunderbird < 140.1.
The product performs reverse DNS resolution on an IP address to obtain the hostname and make a security decision, but it does not properly ensure that the IP address is truly associated with the hostname.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1960834 | permissions required |
https://www.mozilla.org/security/advisories/mfsa2025-56/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-59/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-61/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-63/ | vendor advisory |