Open Redirect Affecting firefox package, versions <114.0+build3-0ubuntu0.20.04.1


Severity

Recommended
0.0
medium
0
10

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.06% (31st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Open Redirect vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UBUNTU2004-FIREFOX-5670592
  • published7 Jun 2023
  • disclosed19 Jun 2023

Introduced: 7 Jun 2023

CVE-2023-34415  (opens in a new tab)
CWE-601  (opens in a new tab)

How to fix?

Upgrade Ubuntu:20.04 firefox to version 114.0+build3-0ubuntu0.20.04.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream firefox package and not the firefox package as distributed by Ubuntu. See How to fix? for Ubuntu:20.04 relevant fixed versions and status.

When choosing a site-isolated process for a document loaded from a data: URL that was the result of a redirect, Firefox would load that document in the same process as the site that issued the redirect. This bypassed the site-isolation protections against Spectre-like attacks on sites that host an "open redirect". Firefox no longer follows HTTP redirects to data: URLs. This vulnerability affects Firefox < 114.

CVSS Scores

version 3.1