Bug 1306856 (CVE-2016-1949)

Summary: CVE-2016-1949 firefox: Same-origin-policy violation using Service Workers with plugins
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: urgent Docs Contact:
Priority: urgent    
Version: unspecifiedCC: gecko-bugs-nobody, jhorak, pjasicek, stransky
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: firefox 44.0.2 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2016-02-12 06:47:52 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1306858    

Description Adam Mariš 2016-02-11 23:20:44 UTC
It was reported that service workers intercept responses to plugin network requests made through the browser. Plugins which make security decisions based on the content of network requests can have these decisions subverted if a service worker forges responses to those requests. For example, a forged crossdomain.xml could allow a malicious site to violate the same-origin policy using the Flash plugin.

External Reference:

https://www.mozilla.org/en-US/security/advisories/mfsa2016-13/

Comment 1 Huzaifa S. Sidhpurwala 2016-02-12 06:47:21 UTC
This issue is addressed via the following Fedora security advisories:

Fedora-22:
https://bodhi.fedoraproject.org/updates/FEDORA-2016-8794abe899

Fedora-23:
https://bodhi.fedoraproject.org/updates/FEDORA-2016-1d8f67dc76

Comment 2 Huzaifa S. Sidhpurwala 2016-02-12 06:47:52 UTC
Statement:

This issue does not affect the versions of Firefox shipped with Red Hat Enterprise Linux 5, 6 and 7.