First published: Tue Nov 02 2021(Updated: )
The 'Copy Image Link' context menu action would copy the final image URL after redirects. By embedding an image that triggered authentication flows - in conjunction with a Content Security Policy that stopped a redirection chain in the middle - the final image URL could be one that contained an authentication token used to takeover a user account. If a website tricked a user into copy and pasting the image link back to the page, the page would be able to steal the authentication tokens. This was fixed by making the action return the original URL, before any redirects.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <94 | 94 |
<94 | 94 | |
Mozilla Firefox | <94.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2021-43532.
The severity of CVE-2021-43532 is medium with a severity value of 6.1.
The affected software is Mozilla Firefox version up to exclusive 94.0.
To fix CVE-2021-43532, update Mozilla Firefox to version 94 or above.
You can find more information about CVE-2021-43532 on the following websites: - [Mozilla Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1719203) - [Mozilla Security Advisories](https://www.mozilla.org/en-US/security/advisories/mfsa2021-48/)