When a user downloaded a file in Firefox for Android, if a cookie is set, it would have been re-sent during a subsequent file download operation on the same domain, regardless of whether the original and subsequent request were in private and non-private browsing modes. Note: This issue only affected Firefox for Android. Other operating systems are unaffected.. This vulnerability affects Firefox < 83.
The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | * | 83.0 (excluding) |
Firefox | Ubuntu | trusty | * |
Firefox | Ubuntu | upstream | * |
Mozjs38 | Ubuntu | bionic | * |
Mozjs38 | Ubuntu | esm-apps/bionic | * |
Mozjs38 | Ubuntu | upstream | * |
Mozjs52 | Ubuntu | bionic | * |
Mozjs52 | Ubuntu | esm-apps/focal | * |
Mozjs52 | Ubuntu | esm-infra/bionic | * |
Mozjs52 | Ubuntu | focal | * |
Mozjs52 | Ubuntu | groovy | * |
Mozjs52 | Ubuntu | upstream | * |
Mozjs60 | Ubuntu | upstream | * |
Mozjs68 | Ubuntu | focal | * |
Mozjs68 | Ubuntu | groovy | * |
Mozjs68 | Ubuntu | upstream | * |