The Pocket toolbar button, once activated, listens for events fired from it's own pages but does not verify the origin of incoming events. This allows content from other origins to fire events and inject content and commands into the Pocket context. Note: this issue does not affect users with e10s enabled. This vulnerability affects Firefox ESR < 45.6 and Firefox < 50.1.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-2946.html | Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2016-2973.html | Third Party Advisory |
http://www.securityfocus.com/bid/94885 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037461 | Third Party Advisory VDB Entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=1320039 | Exploit Issue Tracking Patch |
https://security.gentoo.org/glsa/201701-15 | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2016-94/ | Vendor Advisory |
https://www.mozilla.org/security/advisories/mfsa2016-95/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mozilla
Published: 2018-06-11T21:00:00
Updated: 2018-06-12T09:57:01
Reserved: 2016-12-07T00:00:00
Link: CVE-2016-9902
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-06-11T21:29:02.357
Modified: 2018-08-09T16:39:38.850
Link: CVE-2016-9902
JSON object: View
Redhat Information
No data.
CWE