An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by "blob:" as the protocol, leading to user confusion and further spoofing attacks. This vulnerability affects Firefox < 52.
Un atacante puede utilizar una URL y script blob para suplantar una URL arbitraria de la barra de direcciones precedida por "blob:" como protocolo, lo que conduce a una confusión de usuario y a más ataques de suplantación. La vulnerabilidad afecta a Firefox en versiones anteriores a la 52.
USN-3216-1 fixed vulnerabilities in Firefox. The update resulted in a startup crash when Firefox is used with XRDP. This update fixes the problem. Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to bypass same origin restrictions, obtain sensitive information, spoof the addressbar, spoof the print dialog, cause a denial of service via application crash or hang, or execute arbitrary code. Various other issues were also addressed.