Mozilla SeaMonkey CVE-2015-4519 Information Disclosure Vulnerability
Description
Security researcher Mario Gomes reported that when a previously loaded image on a page is drag and dropped into content after a redirect, the redirected URL is available to scripts. This is a violation of the Fetch specification's defined behavior for "Atomic HTTP redirect handling" which states that redirected URLs are not exposed to any APIs. This can allow for information leakage.
Affected Applications
SeaMonkey