Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox < 68.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2019-21/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1552632 | issue tracking permissions required vendor advisory |
https://security.gentoo.org/glsa/201908-12 | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html | vendor advisory |