A malicious extension with the 'search' permission could have installed a new search engine whose favicon referenced a cross-origin URL. The response to this cross-origin request could have been read by the extension, allowing a same-origin policy bypass by the extension, which should not have cross-origin permissions. This cross-origin request was made without cookies, so the sensitive information disclosed by the violation was limited to local-network resources or resources that perform IP-based authentication. This vulnerability affects Firefox < 87.
{
"binaries": [
{
"binary_name": "firefox",
"binary_version": "87.0+build3-0ubuntu0.16.04.2"
},
{
"binary_name": "firefox-dev",
"binary_version": "87.0+build3-0ubuntu0.16.04.2"
},
{
"binary_name": "firefox-geckodriver",
"binary_version": "87.0+build3-0ubuntu0.16.04.2"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "87.0+build3-0ubuntu0.16.04.2"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_name": "firefox",
"binary_version": "87.0+build3-0ubuntu0.18.04.2"
},
{
"binary_name": "firefox-dev",
"binary_version": "87.0+build3-0ubuntu0.18.04.2"
},
{
"binary_name": "firefox-geckodriver",
"binary_version": "87.0+build3-0ubuntu0.18.04.2"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "87.0+build3-0ubuntu0.18.04.2"
}
],
"availability": "No subscription required"
}{
"binaries": [
{
"binary_name": "firefox",
"binary_version": "87.0+build3-0ubuntu0.20.04.2"
},
{
"binary_name": "firefox-dev",
"binary_version": "87.0+build3-0ubuntu0.20.04.2"
},
{
"binary_name": "firefox-geckodriver",
"binary_version": "87.0+build3-0ubuntu0.20.04.2"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "87.0+build3-0ubuntu0.20.04.2"
}
],
"availability": "No subscription required"
}