A malicious extension with the 'search' permission could have installed a new search engine whose favicon referenced a cross-origin URL. The response to this cross-origin request could have been read by the extension, allowing a same-origin policy bypass by the extension, which should not have cross-origin permissions. This cross-origin request was made without cookies, so the sensitive information disclosed by the violation was limited to local-network resources or resources that perform IP-based authentication. This vulnerability affects Firefox < 87.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "87.0+build3-0ubuntu0.16.04.2", "binary_name": "firefox" }, { "binary_version": "87.0+build3-0ubuntu0.16.04.2", "binary_name": "firefox-dev" }, { "binary_version": "87.0+build3-0ubuntu0.16.04.2", "binary_name": "firefox-geckodriver" }, { "binary_version": "87.0+build3-0ubuntu0.16.04.2", "binary_name": "firefox-mozsymbols" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "87.0+build3-0ubuntu0.18.04.2", "binary_name": "firefox" }, { "binary_version": "87.0+build3-0ubuntu0.18.04.2", "binary_name": "firefox-dev" }, { "binary_version": "87.0+build3-0ubuntu0.18.04.2", "binary_name": "firefox-geckodriver" }, { "binary_version": "87.0+build3-0ubuntu0.18.04.2", "binary_name": "firefox-mozsymbols" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "87.0+build3-0ubuntu0.20.04.2", "binary_name": "firefox" }, { "binary_version": "87.0+build3-0ubuntu0.20.04.2", "binary_name": "firefox-dev" }, { "binary_version": "87.0+build3-0ubuntu0.20.04.2", "binary_name": "firefox-geckodriver" }, { "binary_version": "87.0+build3-0ubuntu0.20.04.2", "binary_name": "firefox-mozsymbols" } ] }