In uBlock before 0.9.5.15, the $rewrite filter option allows filter-list maintainers to run arbitrary code in a client-side session when a web service loads a script for execution using XMLHttpRequest or Fetch, and the script origin has an open redirect.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://armin.dev/blog/2019/04/adblock-plus-code-injection/ | exploit third party advisory mitigation |
https://news.ycombinator.com/item?id=19666504 | third party advisory |