First published: Tue Jun 06 2023(Updated: )
When choosing a site-isolated process for a document loaded from a data: URL that was the result of a redirect, Firefox would load that document in the same process as the site that issued the redirect. This bypassed the site-isolation protections against Spectre-like attacks on sites that host an "open redirect". Firefox no longer follows HTTP redirects to data: URLs.
Credit: security@mozilla.org security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/firefox | <114.0+ | 114.0+ |
Mozilla Firefox | <114 | 114 |
Mozilla Firefox | <114.0 | |
debian/firefox | 123.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2023-34415 is medium.
Mozilla Firefox versions up to and including 114, Ubuntu Firefox versions 114.0+ and Debian Firefox versions up to and including 117.0.1-1 are affected by CVE-2023-34415.
Ensure that you update Mozilla Firefox to version 115 or higher.
Yes, you can find references for CVE-2023-34415 at the following links: [Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1811999), [Mozilla Security Advisory](https://www.mozilla.org/security/advisories/mfsa2023-20/), [Launchpad](https://launchpad.net/bugs/cve/CVE-2023-34415).