ArchLinux: 201602-12: firefox: same-origin policy bypass
Summary
Jason Pang of OneSignal reported that service workers intercept responses to plugin network requests made through the browser. Plugins which make security decisions based on the content of network requests can have these decisions subverted if a service worker forges responses to those requests. For example, a forged crossdomain.xml could allow a malicious site to violate the same-origin policy using the Flash plugin.
Resolution
Upgrade to 44.0.2-1.
# pacman -Syu "firefox>=44.0.2-1"
The problem has been fixed upstream in version 44.0.2.
References
https://www.mozilla.org/en-US/security/advisories/mfsa2016-13/ https://access.redhat.com/security/cve/CVE-2016-1949
Workaround
None.