Due to URL previews in the network panel of developer tools improperly storing URLs, query parameters could potentially be used to overwrite global objects in privileged code. This vulnerability affects Firefox < 110.
The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or incorrectly validates that the quantity has the required properties.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2023-05/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1801542 | issue tracking permissions required |