The web console and JavaScript debugger do not sanitize all output that can be hyperlinked. Both will display "chrome:" links as active, clickable hyperlinks in their output. Web sites should not be able to directly link to internal chrome pages. Additionally, the JavaScript debugger will display "javascript:" links, which users could be tricked into clicking by malicious sites. This vulnerability affects Firefox < 60.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2018-11/ | vendor advisory |
http://www.securitytracker.com/id/1040896 | vdb entry third party advisory |
https://usn.ubuntu.com/3645-1/ | third party advisory vendor advisory |
http://www.securityfocus.com/bid/104139 | vdb entry third party advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1447969 | issue tracking permissions required vendor advisory |