Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-43531

Опубликовано: 08 дек. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 4.3

Описание

When a user loaded a Web Extensions context menu, the Web Extension could access the post-redirect URL of the element clicked. If the Web Extension lacked the WebRequest permission for the hosts involved in the redirect, this would be a same-origin-violation leaking data the Web Extension should have access to. This was fixed to provide the pre-redirect URL. This is related to CVE-2021-43532 but in the context of Web Extensions. This vulnerability affects Firefox < 94.

РелизСтатусПримечание
bionic

not-affected

94.0+build3-0ubuntu0.18.04.1
devel

not-affected

94.0+build3-0ubuntu1
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

not-affected

94.0+build3-0ubuntu0.20.04.1
hirsute

not-affected

94.0+build3-0ubuntu0.21.04.1
impish

not-affected

94.0+build3-0ubuntu0.21.10.1
jammy

not-affected

94.0+build3-0ubuntu1
kinetic

not-affected

94.0+build3-0ubuntu1
lunar

not-affected

94.0+build3-0ubuntu1

Показывать по

EPSS

Процентиль: 34%
0.00138
Низкий

4.3 Medium

CVSS2

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
nvd
около 4 лет назад

When a user loaded a Web Extensions context menu, the Web Extension could access the post-redirect URL of the element clicked. If the Web Extension lacked the WebRequest permission for the hosts involved in the redirect, this would be a same-origin-violation leaking data the Web Extension should have access to. This was fixed to provide the pre-redirect URL. This is related to CVE-2021-43532 but in the context of Web Extensions. This vulnerability affects Firefox < 94.

CVSS3: 4.3
debian
около 4 лет назад

When a user loaded a Web Extensions context menu, the Web Extension co ...

github
около 4 лет назад

When a user loaded a Web Extensions context menu, the Web Extension could access the post-redirect URL of the element clicked. If the Web Extension lacked the WebRequest permission for the hosts involved in the redirect, this would be a same-origin-violation leaking data the Web Extension should have access to. This was fixed to provide the pre-redirect URL. This is related to CVE-2021-43532 but in the context of Web Extensions. This vulnerability affects Firefox < 94.

CVSS3: 4.3
fstec
больше 4 лет назад

Уязвимость браузера Mozilla Firefox, связанная с недостатком в механизме подтверждения источника, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 34%
0.00138
Низкий

4.3 Medium

CVSS2

4.3 Medium

CVSS3