The Pocket toolbar button, once activated, listens for events fired from it's own pages but does not verify the origin of incoming events. This allows content from other origins to fire events and inject content and commands into the Pocket context. Note: this issue does not affect users with e10s enabled. This vulnerability affects Firefox ESR < 45.6 and Firefox < 50.1.
The product does not properly verify that the source of data or communication is valid.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2016-94/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2016-95/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1320039 | issue tracking exploit patch |
http://www.securityfocus.com/bid/94885 | vdb entry third party advisory |
http://www.securitytracker.com/id/1037461 | vdb entry third party advisory |
https://security.gentoo.org/glsa/201701-15 | third party advisory vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2973.html | third party advisory vendor advisory |
http://rhn.redhat.com/errata/RHSA-2016-2946.html | third party advisory vendor advisory |