While the text displayed in Autofill tooltips cannot be directly read by JavaScript, the text was rendered using page fonts. Side-channel attacks on the text by using specially crafted fonts could have lead to this text being inferred by the webpage. This vulnerability affects Firefox < 98.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2022-10/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1741888 | vendor advisory issue tracking exploit |