Bug 2291397 (CVE-2024-5691) - CVE-2024-5691 Mozilla: Sandboxed iframes were able to bypass sandbox restrictions to open a new window
Summary: CVE-2024-5691 Mozilla: Sandboxed iframes were able to bypass sandbox restrict...
Keywords:
Status: NEW
Alias: CVE-2024-5691
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 2284144
TreeView+ depends on / blocked
 
Reported: 2024-06-11 20:45 UTC by Robb Gatica
Modified: 2024-06-24 10:49 UTC (History)
5 users (show)

Fixed In Version: firefox 115.12, thunderbird 115.12
Doc Type: ---
Doc Text:
The Mozilla Foundation Security Advisory describes this flaw as: By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2024:3949 0 None None None 2024-06-17 13:12:15 UTC
Red Hat Product Errata RHSA-2024:3950 0 None None None 2024-06-17 13:14:38 UTC
Red Hat Product Errata RHSA-2024:3951 0 None None None 2024-06-17 13:46:54 UTC
Red Hat Product Errata RHSA-2024:3952 0 None None None 2024-06-17 13:05:23 UTC
Red Hat Product Errata RHSA-2024:3953 0 None None None 2024-06-17 13:18:08 UTC
Red Hat Product Errata RHSA-2024:3954 0 None None None 2024-06-17 13:34:21 UTC
Red Hat Product Errata RHSA-2024:3955 0 None None None 2024-06-17 13:43:14 UTC
Red Hat Product Errata RHSA-2024:3958 0 None None None 2024-06-17 15:20:12 UTC
Red Hat Product Errata RHSA-2024:3972 0 None None None 2024-06-18 06:18:29 UTC
Red Hat Product Errata RHSA-2024:4001 0 None None None 2024-06-20 05:27:10 UTC
Red Hat Product Errata RHSA-2024:4002 0 None None None 2024-06-20 05:56:16 UTC
Red Hat Product Errata RHSA-2024:4003 0 None None None 2024-06-20 05:38:52 UTC
Red Hat Product Errata RHSA-2024:4004 0 None None None 2024-06-20 05:47:45 UTC
Red Hat Product Errata RHSA-2024:4015 0 None None None 2024-06-20 06:50:08 UTC
Red Hat Product Errata RHSA-2024:4016 0 None None None 2024-06-20 08:17:00 UTC
Red Hat Product Errata RHSA-2024:4018 0 None None None 2024-06-20 10:31:45 UTC
Red Hat Product Errata RHSA-2024:4036 0 None None None 2024-06-20 17:24:37 UTC
Red Hat Product Errata RHSA-2024:4063 0 None None None 2024-06-24 10:49:48 UTC

Description Robb Gatica 2024-06-11 20:45:47 UTC
By tricking the browser with a `X-Frame-Options` header, a sandboxed iframe could have presented a button that, if clicked by a user, would bypass restrictions to open a new window.

External Reference:
https://www.mozilla.org/en-US/security/advisories/mfsa2024-26/#CVE-2024-5691

Comment 12 errata-xmlrpc 2024-06-17 13:05:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2024:3952 https://access.redhat.com/errata/RHSA-2024:3952

Comment 13 errata-xmlrpc 2024-06-17 13:12:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:3949 https://access.redhat.com/errata/RHSA-2024:3949

Comment 14 errata-xmlrpc 2024-06-17 13:14:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:3950 https://access.redhat.com/errata/RHSA-2024:3950

Comment 15 errata-xmlrpc 2024-06-17 13:18:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:3953 https://access.redhat.com/errata/RHSA-2024:3953

Comment 16 errata-xmlrpc 2024-06-17 13:34:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:3954 https://access.redhat.com/errata/RHSA-2024:3954

Comment 17 errata-xmlrpc 2024-06-17 13:43:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:3955 https://access.redhat.com/errata/RHSA-2024:3955

Comment 18 errata-xmlrpc 2024-06-17 13:46:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2024:3951 https://access.redhat.com/errata/RHSA-2024:3951

Comment 19 errata-xmlrpc 2024-06-17 15:20:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:3958 https://access.redhat.com/errata/RHSA-2024:3958

Comment 31 errata-xmlrpc 2024-06-18 06:18:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:3972 https://access.redhat.com/errata/RHSA-2024:3972

Comment 32 errata-xmlrpc 2024-06-20 05:27:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2024:4001 https://access.redhat.com/errata/RHSA-2024:4001

Comment 33 errata-xmlrpc 2024-06-20 05:38:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:4003 https://access.redhat.com/errata/RHSA-2024:4003

Comment 34 errata-xmlrpc 2024-06-20 05:47:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2024:4004 https://access.redhat.com/errata/RHSA-2024:4004

Comment 35 errata-xmlrpc 2024-06-20 05:56:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2024:4002 https://access.redhat.com/errata/RHSA-2024:4002

Comment 36 errata-xmlrpc 2024-06-20 06:50:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2024:4015 https://access.redhat.com/errata/RHSA-2024:4015

Comment 37 errata-xmlrpc 2024-06-20 08:16:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2024:4016 https://access.redhat.com/errata/RHSA-2024:4016

Comment 38 errata-xmlrpc 2024-06-20 10:31:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2024:4018 https://access.redhat.com/errata/RHSA-2024:4018

Comment 39 errata-xmlrpc 2024-06-20 17:24:35 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2024:4036 https://access.redhat.com/errata/RHSA-2024:4036

Comment 40 errata-xmlrpc 2024-06-24 10:49:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2024:4063 https://access.redhat.com/errata/RHSA-2024:4063


Note You need to log in before you can comment on or make changes to this bug.