The protocol-handler dialog in Mozilla Firefox before 44.0 allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1034825 | vdb entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=724353 | |
http://www.ubuntu.com/usn/USN-2880-1 | vendor advisory |
http://www.securityfocus.com/bid/81957 | vdb entry |
http://www.ubuntu.com/usn/USN-2880-2 | vendor advisory |
http://www.mozilla.org/security/announce/2016/mfsa2016-06.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html | vendor advisory |
https://security.gentoo.org/glsa/201605-06 | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00001.html | vendor advisory |