First published: Wed Oct 15 2014(Updated: )
The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=32.0 | |
Mozilla Firefox | =30.0 | |
Mozilla Firefox | =31.0 | |
Mozilla Firefox | =31.1.0 | |
Mozilla Firefox ESR | =31.0 | |
Mozilla Firefox ESR | =31.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1583 has been classified as a moderate severity vulnerability.
To fix CVE-2014-1583, update Mozilla Firefox to version 33.0 or later, or Firefox ESR to version 31.2 or later.
CVE-2014-1583 affects Mozilla Firefox versions prior to 33.0 and Firefox ESR versions prior to 31.2.
Yes, CVE-2014-1583 can allow remote attackers to bypass the Same Origin Policy and access sensitive information.
The vulnerability in CVE-2014-1583 is due to improper restriction of toJSON calls in the Alarm API.