ASA-2019-00432 – Mozilla Firefox and Thunderbird: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects


Allele Security Alert

ASA-2019-00432

Identifier(s)

ASA-2019-00432, CVE-2019-11712, MFSA2019-21, MFSA2019-22, MFSA2019-23

Title

Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects

Vendor(s)

Mozilla

Product(s)

Mozilla Firefox
Mozilla Firefox ESR
Mozilla Thunderbird

Affected version(s)

Mozilla Firefox versions before 68
Mozilla Firefox ESR versions before 60.8
Mozilla Thunderbird versions before 60.8

Fixed version(s)

Mozilla Firefox version 68
Mozilla Firefox ESR version 60.8
Mozilla Thunderbird version 60.8

Proof of concept

Unknown

Description

POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks.

Technical details

Unknown

Credits

Gregory Smiley (Security Compass)

Reference(s)

Mozilla Foundation Security Advisory 2019-21
https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/#CVE-2019-11712

Mozilla Foundation Security Advisory 2019-22
https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11712

Mozilla Foundation Security Advisory 2019-23
https://www.mozilla.org/en-US/security/advisories/mfsa2019-23/#CVE-2019-11712

Bug 1543804
https://bugzilla.mozilla.org/show_bug.cgi?id=1543804

CVE-2019-11712
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11712

CVE-2019-11712
https://nvd.nist.gov/vuln/detail/CVE-2019-11712

If there is any error in this alert or you wish a comprehensive analysis, let us know.

Last modified: July 23, 2019

We are not responsible for any data loss, device corruption or any other type of issue due to the use of any information mentioned in our security alerts.