[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Security bypass vulnerability in the add-on installation feature in Mozilla Firefox or Firefox ESR by constructing a crafted data: URL (Mac OS X)

ID: oval:org.secpod.oval:def:30742Date: (C)2015-11-02   (M)2023-12-07
Class: VULNERABILITYFamily: macos




The host is installed with Mozilla Firefox before 40.0.3 or Firefox ESR 38.x before 38.2.1 and is prone to a security bypass vulnerability. A flaw is present in the applications, which fail to handle a crafted data: URL. Successful exploitation could allow attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.

Platform:
Apple Mac OS 14
Apple Mac OS 13
Apple Mac OS 12
Apple Mac OS 11
Apple Mac OS X 10.15
Apple Mac OS X 10.14
Apple Mac OS X 10.12
Apple Mac OS X 10.13
Apple Mac OS X 10.11
Apple Mac OS X Server 10.8
Apple Mac OS X Server 10.9
Apple Mac OS X Server 10.10
Apple Mac OS X Server 10.11
Product:
Mozilla Firefox ESR
Mozilla Firefox
Reference:
CVE-2015-4498
CVE    1
CVE-2015-4498
CPE    7
cpe:/a:mozilla:firefox_esr:38.2.0
cpe:/a:mozilla:firefox_esr:38.0.1
cpe:/a:mozilla:firefox_esr:38.1.0
cpe:/a:mozilla:firefox_esr
...

© SecPod Technologies