Site-isolation bypass on sites that allow open redirects to data - CVE-2023-34415ID: oval:org.secpod.oval:def:90291 | Date: (C)2023-06-07 (M)2024-03-27 |
Class: VULNERABILITY | Family: macos |
Mozilla Firefox 114 : When choosing a site-isolated process for a document loaded from a data: URL that was the result of a redirect, Firefox would load that document in the same process as the site that issued the redirect. This bypassed the site-isolation protections against Spectre-like attacks on sites that host an "open redirect". Firefox no longer follows HTTP redirects to data: URLs.
Platform: |
Apple Mac OS 14 |
Apple Mac OS X 10.10 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.15 |
Apple Mac OS 11 |
Apple Mac OS 12 |
Apple Mac OS 13 |