When a user typed a URL in the address bar or the search bar and quickly hit the enter key, a website could sometimes capture that event and then redirect the user before navigation occurred to the desired, entered address. To construct a convincing spoof the attacker would have had to guess what the user was typing, perhaps by suggesting it. This vulnerability affects Firefox < 84.
{
"binaries": [
{
"binary_name": "firefox",
"binary_version": "84.0+build3-0ubuntu0.16.04.1"
},
{
"binary_name": "firefox-dev",
"binary_version": "84.0+build3-0ubuntu0.16.04.1"
},
{
"binary_name": "firefox-geckodriver",
"binary_version": "84.0+build3-0ubuntu0.16.04.1"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "84.0+build3-0ubuntu0.16.04.1"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_name": "firefox",
"binary_version": "84.0+build3-0ubuntu0.18.04.1"
},
{
"binary_name": "firefox-dev",
"binary_version": "84.0+build3-0ubuntu0.18.04.1"
},
{
"binary_name": "firefox-geckodriver",
"binary_version": "84.0+build3-0ubuntu0.18.04.1"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "84.0+build3-0ubuntu0.18.04.1"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_name": "firefox",
"binary_version": "84.0+build3-0ubuntu0.20.04.1"
},
{
"binary_name": "firefox-dev",
"binary_version": "84.0+build3-0ubuntu0.20.04.1"
},
{
"binary_name": "firefox-geckodriver",
"binary_version": "84.0+build3-0ubuntu0.20.04.1"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "84.0+build3-0ubuntu0.20.04.1"
}
],
"availability": "No subscription required"
}