Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.
The product does not properly verify that the source of data or communication is valid.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2021-47/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2021-45/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2021-43/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1726621 | permissions required vendor advisory |