By using XSL Transforms, a malicious webserver could have served a user an XSL document that would continue to execute JavaScript (within the bounds of the same-origin policy) even after the tab was closed. This vulnerability affects Firefox < 97.
The product uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2022-04/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1309630 | vendor advisory issue tracking |