Bug 1315776 (CVE-2016-1967) - CVE-2016-1967 Mozilla: Same-origin policy violation using perfomance.getEntries and history navigation with session restore (MFSA 2016-29)
Summary: CVE-2016-1967 Mozilla: Same-origin policy violation using perfomance.getEntri...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2016-1967
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1313724
TreeView+ depends on / blocked
 
Reported: 2016-03-08 15:09 UTC by Huzaifa S. Sidhpurwala
Modified: 2021-02-17 04:12 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-03-09 08:39:21 UTC
Embargoed:


Attachments (Terms of Use)

Description Huzaifa S. Sidhpurwala 2016-03-08 15:09:12 UTC
Security researcher Jordi Chancel discovered a variant of a href="https://www.mozilla.org/security/advisories/mfsa2015-136/">Mozilla Foundation Security Advisory 2015-136 which was fixed in Firefox 43. In the original bug, it was possible to read cross-origin URLs following a redirect if perfomance.getEntries() was used along with an iframe to host a page. Navigating back in history through script, content was pulled from the browser cache for the redirected location instead of going to the original location. In the newly reported variant issue, it was found that if a browser session was restored, history navigation would still allow for the same attack as content was restored from the browser cache. This is a same-origin policy violation and could allow for data theft. 


External Reference:

https://www.mozilla.org/security/announce/2016/mfsa2016-29.html


Acknowledgements:

Name: the Mozilla project
Upstream: Jordi Chancel

Statement:

This issue does not affect the version of firefox and thunderbird as shipped with Red Hat Enterprise Linux 5, 6 and 7.


Note You need to log in before you can comment on or make changes to this bug.