JavaScript in the "about:webrtc" page is not sanitized properly being assigned to "innerHTML". Data on this page is supplied by WebRTC usage and is not under third-party control, making this difficult to exploit, but the vulnerability could possibly be used for a cross-site scripting (XSS) attack. This vulnerability affects Firefox < 55.
{ "binaries": [ { "binary_version": "55.0.1+build2-0ubuntu0.14.04.2", "binary_name": "firefox" }, { "binary_version": "55.0.1+build2-0ubuntu0.14.04.2", "binary_name": "firefox-dev" }, { "binary_version": "55.0.1+build2-0ubuntu0.14.04.2", "binary_name": "firefox-globalmenu" }, { "binary_version": "55.0.1+build2-0ubuntu0.14.04.2", "binary_name": "firefox-mozsymbols" }, { "binary_version": "55.0.1+build2-0ubuntu0.14.04.2", "binary_name": "firefox-testsuite" } ], "availability": "No subscription required" }
{ "binaries": [ { "binary_version": "55.0.1+build2-0ubuntu0.16.04.2", "binary_name": "firefox" }, { "binary_version": "55.0.1+build2-0ubuntu0.16.04.2", "binary_name": "firefox-dev" }, { "binary_version": "55.0.1+build2-0ubuntu0.16.04.2", "binary_name": "firefox-globalmenu" }, { "binary_version": "55.0.1+build2-0ubuntu0.16.04.2", "binary_name": "firefox-mozsymbols" }, { "binary_version": "55.0.1+build2-0ubuntu0.16.04.2", "binary_name": "firefox-testsuite" } ], "availability": "No subscription required" }