When a "javascript:" URL is drag and dropped by a user into the addressbar, the URL will be processed and executed. This allows for users to be socially engineered to execute an XSS attack on themselves. This vulnerability affects Firefox < 53.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "firefox",
"binary_version": "53.0+build6-0ubuntu0.14.04.1"
},
{
"binary_name": "firefox-dev",
"binary_version": "53.0+build6-0ubuntu0.14.04.1"
},
{
"binary_name": "firefox-globalmenu",
"binary_version": "53.0+build6-0ubuntu0.14.04.1"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "53.0+build6-0ubuntu0.14.04.1"
},
{
"binary_name": "firefox-testsuite",
"binary_version": "53.0+build6-0ubuntu0.14.04.1"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "firefox",
"binary_version": "53.0+build6-0ubuntu0.16.04.1"
},
{
"binary_name": "firefox-dev",
"binary_version": "53.0+build6-0ubuntu0.16.04.1"
},
{
"binary_name": "firefox-globalmenu",
"binary_version": "53.0+build6-0ubuntu0.16.04.1"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "53.0+build6-0ubuntu0.16.04.1"
},
{
"binary_name": "firefox-testsuite",
"binary_version": "53.0+build6-0ubuntu0.16.04.1"
}
]
}