Mozilla Firefox Content-Type Header Manipulation Vulnerabilities
3 Dec. 2015
Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote attackers to bypass the Same Origin Policy by leveraging the lack of a preflight-request step.
The information has been provided by Ronald Crane, Vytautas Staraitis, Gustavo Grieco, Shinto K Anto, Looben Yang, Michal Bentkowski, Christian Holler, David Major, Jesse Ruderman, Tyson Smith, Boris Zbarsky, Randell Jesup, Olli Pettay, Karl Tomlinson, Jeff Walden, Gary Kwong, Andrew McCreigh.
* Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4
* Mozilla Firefox after 42.0 and Firefox ESR 38.x after 38.4
Attackers can exploit these issues to bypass security restrictions and perform unauthorized actions, obtain sensitive information, bypass same-origin policy restrictions to access data, execute arbitrary script code in the browser of an unsuspecting user in the context of another site, and execute arbitrary code in the context of the affected application. Failed exploit attempts will likely result in denial-of-service conditions.