First published: Thu Sep 24 2015(Updated: )
Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow user-assisted remote attackers to bypass intended access restrictions and discover a redirect's target URL via crafted JavaScript code that executes after a drag-and-drop action of an image into a TEXTBOX element.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | =38.0 | |
Firefox | =38.0.1 | |
Firefox | =38.0.5 | |
Firefox | =38.1.0 | |
Firefox | =38.1.1 | |
Firefox | =38.2.0 | |
Firefox | =38.2.1 | |
Firefox | <=40.0.3 | |
Firefox ESR | =38.0 | |
Firefox ESR | =38.0.1 | |
Firefox ESR | =38.0.5 | |
Firefox ESR | =38.1.0 | |
Firefox ESR | =38.1.1 | |
Firefox ESR | =38.2.0 | |
Firefox ESR | =38.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-4519 is considered a moderate severity vulnerability due to its potential to allow information disclosure.
To fix CVE-2015-4519, you should upgrade to Mozilla Firefox version 41.0 or later.
CVE-2015-4519 affects Mozilla Firefox versions prior to 41.0 and Firefox ESR versions prior to 38.3.
CVE-2015-4519 enables user-assisted remote attackers to bypass access restrictions via crafted JavaScript.
Yes, through CVE-2015-4519, attackers can discover a redirect's target URL, potentially leading to unauthorized access.