First published: Sun Aug 16 2015(Updated: )
The nsCSPHostSrc::permits function in dom/security/nsCSPUtils.cpp in Mozilla Firefox before 40.0 does not implement the Content Security Policy Level 2 exceptions for the blob, data, and filesystem URL schemes during wildcard source-expression matching, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging unexpected policy-enforcement behavior.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <=39.0.3 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.04 | |
openSUSE | =13.1 | |
openSUSE | =13.2 | |
Oracle Solaris SPARC | =11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4490 has a medium severity rating due to potential exploitation by remote attackers.
To fix CVE-2015-4490, update Mozilla Firefox to version 40.0 or later.
Mozilla Firefox versions prior to 40.0 are affected by CVE-2015-4490.
Yes, CVE-2015-4490 affects certain versions of Ubuntu Linux running affected Firefox versions.
CVE-2015-4490 can enable attacks that exploit weaknesses in Content Security Policy implementations.