The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.
{
"binaries": [
{
"binary_name": "firefox",
"binary_version": "40.0.3+build1-0ubuntu0.14.04.1"
},
{
"binary_name": "firefox-globalmenu",
"binary_version": "40.0.3+build1-0ubuntu0.14.04.1"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "40.0.3+build1-0ubuntu0.14.04.1"
},
{
"binary_name": "firefox-testsuite",
"binary_version": "40.0.3+build1-0ubuntu0.14.04.1"
}
],
"availability": "No subscription required"
}