A malicious extension could have called <code>browser.identity.launchWebAuthFlow</code>, controlling the redirect_uri, and through the Promise returned, obtain the Auth code and gain access to the user's account at the service provider. This vulnerability affects Firefox < 75.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2020-12/ | third party advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1614919 | vendor advisory issue tracking |