CVE-2021-43532
Published: 8 December 2021
The 'Copy Image Link' context menu action would copy the final image URL after redirects. By embedding an image that triggered authentication flows - in conjunction with a Content Security Policy that stopped a redirection chain in the middle - the final image URL could be one that contained an authentication token used to takeover a user account. If a website tricked a user into copy and pasting the image link back to the page, the page would be able to steal the authentication tokens. This was fixed by making the action return the original URL, before any redirects. This vulnerability affects Firefox < 94.
Notes
Author | Note |
---|---|
tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
Priority
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(94.0+build3-0ubuntu0.18.04.1)
|
focal |
Not vulnerable
(94.0+build3-0ubuntu0.20.04.1)
|
|
hirsute |
Not vulnerable
(94.0+build3-0ubuntu0.21.04.1)
|
|
impish |
Not vulnerable
(94.0+build3-0ubuntu0.21.10.1)
|
|
jammy |
Not vulnerable
(94.0+build3-0ubuntu1)
|
|
kinetic |
Not vulnerable
(94.0+build3-0ubuntu1)
|
|
lunar |
Not vulnerable
(94.0+build3-0ubuntu1)
|
|
trusty |
Does not exist
|
|
upstream |
Released
(94)
|
|
xenial |
Ignored
(end of standard support, was needed)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.1 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Changed |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |