Unrated severityNVD Advisory· Published Sep 24, 2015· Updated May 6, 2026
CVE-2015-4520
CVE-2015-4520
Description
Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
Affected products
20- osv-coords20 versionspkg:rpm/opensuse/firefox-esr&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/MozillaFirefox&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/MozillaThunderbird&distro=openSUSE%20Tumbleweedpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Desktop%2011%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-TERADATApkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Desktop%2012pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%2012pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012
< 128.5.1-1.1+ 19 more
- (no CPE)range: < 128.5.1-1.1
- (no CPE)range: < 50.1.0-1.1
- (no CPE)range: < 45.5.1-1.1
- (no CPE)range: < 38.3.0esr-22.1
- (no CPE)range: < 38.3.0esr-22.1
- (no CPE)range: < 38.3.0esr-48.1
- (no CPE)range: < 38.3.0esr-22.1
- (no CPE)range: < 38.3.0esr-22.1
- (no CPE)range: < 38.3.0esr-22.1
- (no CPE)range: < 38.3.0esr-48.1
- (no CPE)range: < 38.3.0esr-22.1
- (no CPE)range: < 38.3.0esr-22.1
- (no CPE)range: < 38.3.0esr-48.1
- (no CPE)range: < 38.3.0esr-22.1
- (no CPE)range: < 38.3.0esr-22.1
- (no CPE)range: < 38.3.0esr-48.1
- (no CPE)range: < 4.10.9-6.1
- (no CPE)range: < 4.10.9-6.1
- (no CPE)range: < 4.10.9-6.1
- (no CPE)range: < 4.10.9-6.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
21- www.mozilla.org/security/announce/2015/mfsa2015-111.htmlnvdVendor Advisory
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00000.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00003.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00004.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00005.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-10/msg00007.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-11/msg00025.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-1834.htmlnvd
- rhn.redhat.com/errata/RHSA-2015-1852.htmlnvd
- www.debian.org/security/2015/dsa-3365nvd
- www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlnvd
- www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.htmlnvd
- www.securityfocus.com/bid/76816nvd
- www.securitytracker.com/id/1033640nvd
- www.ubuntu.com/usn/USN-2743-1nvd
- www.ubuntu.com/usn/USN-2743-2nvd
- www.ubuntu.com/usn/USN-2743-3nvd
- www.ubuntu.com/usn/USN-2743-4nvd
- www.ubuntu.com/usn/USN-2754-1nvd
- bugzilla.mozilla.org/show_bug.cginvd
- bugzilla.mozilla.org/show_bug.cginvd
News mentions
0No linked articles in our index yet.