CORS requests should not follow 30x redirections after preflight

Related Vulnerabilities: CVE-2015-0807  

Mozilla Foundation Security Advisory 2015-37

CORS requests should not follow 30x redirections after preflight

Announced
March 31, 2015
Reporter
Christoph Kerschbaumer, Muneaki Nishimura
Impact
High
Products
Firefox, Firefox ESR, Firefox OS, SeaMonkey, Thunderbird
Fixed in
  • Firefox 37
  • Firefox ESR 31.6
  • Firefox OS 2.2
  • SeaMonkey 2.35
  • Thunderbird 31.6

Description

Mozilla developer Christoph Kerschbaumer discovered an issue while investigating Mozilla Foundation Security Advisory 2015-03, previously reported by security researcher Muneaki Nishimura. This flaw was that a cross-origin resource sharing (CORS) request should not follow 30x redirections after preflight according to the specification. This only affects sendBeacon() requests but could allow for a potential Cross-site request forgery (XSRF) attack from malicious websites.

In general this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled, but is potentially a risk in browser or browser-like contexts.

References