First published: Tue Oct 01 2024(Updated: )
An attacker could, via a specially crafted multipart response, execute arbitrary JavaScript under the `resource://pdf.js` origin. This could allow them to access cross-origin PDF content. This access is limited to "same site" documents by the Site Isolation feature on desktop clients, but full cross-origin access is possible on Android versions. This vulnerability affects Firefox < 131, Firefox ESR < 128.3, Firefox ESR < 115.16, Thunderbird < 128.3, and Thunderbird < 131.
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <131 | |
Firefox ESR | <128.3<115.16 | |
Thunderbird | <128.3<131 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2315956 is classified as high due to the potential for arbitrary JavaScript execution.
To fix REDHAT-BUG-2315956, it is recommended to update to the latest version of affected software as per the security advisories.
The affected software includes Mozilla Firefox versions up to 131, Firefox ESR versions up to 128.3 and 115.16, and Thunderbird versions up to 128.3 and 131.
The impact of REDHAT-BUG-2315956 allows attackers to execute malicious JavaScript and potentially access cross-origin PDF content.
REDHAT-BUG-2315956 was reported to address vulnerabilities related to JavaScript execution in specific Mozilla products.