When downloading an update for an addon, the downloaded addon update's version was not verified to match the version selected from the manifest. If the manifest had been tampered with on the server, an attacker could trick the browser into downgrading the addon to a prior version. This vulnerability affects Firefox < 102.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2022-24/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1766047 | issue tracking permissions required vendor advisory |