Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP frame-src bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Thunderbird < 115.18.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "115.8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "133.0"
}
]
},
{
"events": [
{
"introduced": "116.0"
},
{
"fixed": "128.5.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "115.18.0"
}
]
},
{
"events": [
{
"introduced": "116.0"
},
{
"fixed": "128.5.0"
}
]
},
{
"events": [
{
"introduced": "129.0"
},
{
"fixed": "133.0"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-11694.json"