CVE-2021-43532 — Open Redirect in Mozilla Firefox
Severity
6.1MEDIUMNVD
NVD4.3OSV4.3
EPSS
0.1%
top 64.80%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 8
Latest updateDec 9
Description
The 'Copy Image Link' context menu action would copy the final image URL after redirects. By embedding an image that triggered authentication flows - in conjunction with a Content Security Policy that stopped a redirection chain in the middle - the final image URL could be one that contained an authentication token used to takeover a user account. If a website tricked a user into copy and pasting the image link back to the page, the page would be able to steal the authentication tokens. This was…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7
Affected Packages5 packages
🔴Vulnerability Details
4GHSA▶
GHSA-x5xq-hf4g-4cgq: The 'Copy Image Link' context menu action would copy the final image URL after redirects↗2021-12-09
GHSA▶
GHSA-r6p5-8pxg-2vcp: When a user loaded a Web Extensions context menu, the Web Extension could access the post-redirect URL of the element clicked↗2021-12-09
OSV▶
CVE-2021-43531: When a user loaded a Web Extensions context menu, the Web Extension could access the post-redirect URL of the element clicked↗2021-12-08
OSV▶
CVE-2021-43532: The 'Copy Image Link' context menu action would copy the final image URL after redirects↗2021-12-08