A compromised sandboxed content process can perform a Universal Cross-site
Scripting (UXSS) attack on content from any site it can cause to be loaded
in the same process. Because addons.mozilla.org and accounts.firefox.com
have close ties to the Firefox product, malicious manipulation of these
sites within the browser can potentially be used to modify a user’s Firefox
configuration. These two sites will now be isolated into their own process
and not allowed to be loaded in a standard content process. This
vulnerability affects Firefox < 69.
Author | Note |
---|---|
tyhicks | mozjs contains a copy of the SpiderMonkey JavaScript engine |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | firefox | < 69.0+build2-0ubuntu0.18.04.1 | UNKNOWN |
ubuntu | 19.04 | noarch | firefox | < 69.0+build2-0ubuntu0.19.04.1 | UNKNOWN |
ubuntu | 19.10 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 20.04 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 20.10 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 21.04 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 21.10 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 22.04 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 22.10 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |
ubuntu | 23.04 | noarch | firefox | < 69.0.1+build1-0ubuntu2 | UNKNOWN |