CVE-2023-34415

When choosing a site-isolated process for a document loaded from a data: URL that was the result of a redirect, Firefox would load that document in the same process as the site that issued the redirect. This bypassed the site-isolation protections against Spectre-like attacks on sites that host an "open redirect". Firefox no longer follows HTTP redirects to data: URLs. This vulnerability affects Firefox < 114.
Open Redirect
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.1 MEDIUM
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
mozillaCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
VendorProductVersion
mozillafirefox
𝑥
< 114.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
firefox
sid
133.0.3-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
firefox
lunar
not-affected
kinetic
not-affected
jammy
not-affected
focal
Fixed 114.0+build3-0ubuntu0.20.04.1
released
bionic
ignored
xenial
ignored
trusty
ignored
thunderbird
lunar
not-affected
kinetic
ignored
jammy
not-affected
focal
not-affected
bionic
ignored
xenial
ignored
trusty
ignored