First published: Tue Jun 28 2022(Updated: )
Even when an iframe was sandboxed with <code>allow-top-navigation-by-user-activation</code>, if it received a redirect header to an external protocol the browser would process the redirect and prompt the user as appropriate. This vulnerability affects Firefox < 102.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <102 | 102 |
Firefox | <102.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2022-34474.
The severity of CVE-2022-34474 is medium with a CVSS score of 6.1.
Firefox versions up to and excluding 102 are affected by CVE-2022-34474.
Even when an iframe is sandboxed with allow-top-navigation-by-user-activation, if it receives a redirect header to an external protocol, the browser will process the redirect and prompt the user as appropriate.
You can find more information about CVE-2022-34474 in the following references: [1](https://bugzilla.mozilla.org/show_bug.cgi?id=1677138), [2](https://www.mozilla.org/en-US/security/advisories/mfsa2022-24/), [3](https://www.mozilla.org/security/advisories/mfsa2022-24/)