Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox_esr | Mozilla | 38.0 | 38.0 |
Firefox_esr | Mozilla | 38.2.1 | 38.2.1 |
Firefox_esr | Mozilla | 38.1.0 | 38.1.0 |
Firefox_esr | Mozilla | 38.2.0 | 38.2.0 |
Firefox_esr | Mozilla | 38.0.5 | 38.0.5 |
Firefox_esr | Mozilla | 38.0.1 | 38.0.1 |
Firefox_esr | Mozilla | 38.1.1 | 38.1.1 |