First published: Tue Apr 11 2023(Updated: )
Using a redirect embedded into <code>sourceMappingUrls</code> could allow for navigation to external protocol links in sandboxed iframes without <code>allow-top-navigation-to-custom-protocols</code>. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <112 | 112 |
All of | ||
Mozilla Firefox | =112 | |
Google Android | ||
All of | ||
Mozilla Focus | =112 | |
Google Android | ||
Mozilla Firefox | <112.0 | |
Mozilla Firefox | <112.0 | |
Mozilla Focus | <112.0 | |
ubuntu/firefox | <112.0+ | 112.0+ |
ubuntu/firefox | <112.0+ | 112.0+ |
ubuntu/firefox | <112.0-1 | 112.0-1 |
debian/firefox | 128.0.3-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-29540 is a vulnerability that allows for navigation to external protocol links in sandboxed iframes without the 'allow-top-navigation-to-custom-protocols' permission.
Firefox for Android < 112, Firefox < 112, and Focus for Android < 112 are affected by CVE-2023-29540.
CVE-2023-29540 has a severity level of medium (4).
To fix CVE-2023-29540, update your Firefox to version 112.0+ or later.
You can find more information about CVE-2023-29540 on the Mozilla Security Advisories page and the Bugzilla page.