HTML tags received from the Pocket server will be processed without sanitization and any JavaScript code executed will be run in the "about:pocket-saved" (unprivileged) page, giving it access to Pocket's messaging API through HTML injection. This vulnerability affects Firefox ESR < 45.6 and Firefox < 50.1.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2016-94/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2016-95/ | vendor advisory |
http://www.securityfocus.com/bid/94885 | vdb entry third party advisory |
http://www.securitytracker.com/id/1037461 | vdb entry third party advisory |
https://security.gentoo.org/glsa/201701-15 | third party advisory vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2973.html | third party advisory vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1320057 | issue tracking patch |
http://rhn.redhat.com/errata/RHSA-2016-2946.html | third party advisory vendor advisory |