The Pocket toolbar button, once activated, listens for events fired from it’s own pages but does not verify the origin of incoming events. This allows content from other origins to fire events and inject content and commands into the Pocket context. Note: this issue does not affect users with e10s enabled. This vulnerability affects Firefox ESR < 45.6 and Firefox < 50.1.
[
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "45.6",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "50.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
]
rhn.redhat.com/errata/RHSA-2016-2946.html
rhn.redhat.com/errata/RHSA-2016-2973.html
www.securityfocus.com/bid/94885
www.securitytracker.com/id/1037461
bugzilla.mozilla.org/show_bug.cgi?id=1320039
security.gentoo.org/glsa/201701-15
www.mozilla.org/security/advisories/mfsa2016-94/
www.mozilla.org/security/advisories/mfsa2016-95/