If an attacker is able to alter specific about:config values (for example malware running on the user's computer), the Devtools remote debugging feature could have been enabled in a way that was unnoticable to the user. This would have allowed a remote attacker (able to make a direct network connection to the victim) to monitor the user's browsing activity and (plaintext) network traffic. This was addressed by providing a visual cue when Devtools has an open network socket. This vulnerability affects Firefox < 87.
{
"binaries": [
{
"binary_version": "87.0+build3-0ubuntu0.16.04.2",
"binary_name": "firefox"
},
{
"binary_version": "87.0+build3-0ubuntu0.16.04.2",
"binary_name": "firefox-dev"
},
{
"binary_version": "87.0+build3-0ubuntu0.16.04.2",
"binary_name": "firefox-geckodriver"
},
{
"binary_version": "87.0+build3-0ubuntu0.16.04.2",
"binary_name": "firefox-mozsymbols"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "87.0+build3-0ubuntu0.18.04.2",
"binary_name": "firefox"
},
{
"binary_version": "87.0+build3-0ubuntu0.18.04.2",
"binary_name": "firefox-dev"
},
{
"binary_version": "87.0+build3-0ubuntu0.18.04.2",
"binary_name": "firefox-geckodriver"
},
{
"binary_version": "87.0+build3-0ubuntu0.18.04.2",
"binary_name": "firefox-mozsymbols"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_version": "87.0+build3-0ubuntu0.20.04.2",
"binary_name": "firefox"
},
{
"binary_version": "87.0+build3-0ubuntu0.20.04.2",
"binary_name": "firefox-dev"
},
{
"binary_version": "87.0+build3-0ubuntu0.20.04.2",
"binary_name": "firefox-geckodriver"
},
{
"binary_version": "87.0+build3-0ubuntu0.20.04.2",
"binary_name": "firefox-mozsymbols"
}
],
"availability": "No subscription required"
}