Firefox Fixes Cross-Site Flaws
Mozilla developers plug XSS, XSRF and memory vulnerabilities in Firefox browser.
If you're a Firefox user, don't be surprised to get an update notice when you open your browser this morning.
Yet again, Mozilla developers have pushed out an update for Firefox that aims to fix nagging security issues. Firefox 188.8.131.52 takes a kick at dealing with a particularly nasty Cross-Site Scripting (XSS) flaw that had been publicly reported months ago.
Mozilla's security advisory describes the XSS flaw as being related to the "jar: URI" scheme, which is a mechanism to support digitally signed Web pages and allows those pages to load ZIP archives.
Earlier this month, however, Mozilla developers reconsidered the flaw's severity and its ability to be exploited when noted security research Michal Zalewski revealed that the problem could affect a large part of the Web.
"Please note that the vulnerability is more severe and more difficult to mitigate than initially indicated; it does not require the attacked site to host a malicious JAR file, as the security context is not properly updated on 302 redirects," Zalewski wrote in a Bugzilla entry.
Mozilla's advisory today also notes that a published proof-of-concept shows the flaw could have been used to steal the Gmail contacts of logged-in Gmail users.
Firefox 184.108.40.206 also fixes a vulnerability that could have enabled Cross-Site Request Forgery (CSRF) attacks. The flaw is related to how Firefox handles referrer headers, which could potentially be spoofed by an attacker.
"When navigation occurs due to setting window.location, the Referrer header is supposed to reflect the address of the content which initiated the script," Mozilla explained in its advisory. "Instead, the referrer was set to the address of the window (or frame) in which the script was running, and this vulnerability arises from that tiny difference."