Feed protocol with POST bypasses mixed content protections

Related Vulnerabilities: CVE-2015-4483  

Mozilla Foundation Security Advisory 2015-86

Feed protocol with POST bypasses mixed content protections

Announced
August 11, 2015
Reporter
Masato Kinugawa
Impact
Low
Products
Firefox, SeaMonkey
Fixed in
  • Firefox 40
  • SeaMonkey 2.38

Description

Security researcher Masato Kinugawa reported that opening a target page using a POST to the url prefixed with the feed: protocol disables the mixed content blocker for that page. This could allow for the risk of a man-in-the-middle (MITM) scripting attack on pages that accidentally include insecure content which would otherwise be blocked.

References