Mozilla Firefox before 46.0 allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via the multipart/x-mixed-replace content type.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "firefox",
"binary_version": "46.0+build5-0ubuntu0.14.04.2"
},
{
"binary_name": "firefox-dev",
"binary_version": "46.0+build5-0ubuntu0.14.04.2"
},
{
"binary_name": "firefox-globalmenu",
"binary_version": "46.0+build5-0ubuntu0.14.04.2"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "46.0+build5-0ubuntu0.14.04.2"
},
{
"binary_name": "firefox-testsuite",
"binary_version": "46.0+build5-0ubuntu0.14.04.2"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "firefox",
"binary_version": "46.0+build5-0ubuntu0.16.04.2"
},
{
"binary_name": "firefox-dev",
"binary_version": "46.0+build5-0ubuntu0.16.04.2"
},
{
"binary_name": "firefox-globalmenu",
"binary_version": "46.0+build5-0ubuntu0.16.04.2"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "46.0+build5-0ubuntu0.16.04.2"
},
{
"binary_name": "firefox-testsuite",
"binary_version": "46.0+build5-0ubuntu0.16.04.2"
}
]
}