If an object prototype was corrupted by an attacker, they would have been able to set undesired attributes on a JavaScript object, leading to privileged code execution. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11.
The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2022-24/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-26/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-25/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1771381 | issue tracking permissions required vendor advisory |