A "javascript:" url loaded by a malicious page can obfuscate its location by blanking the URL displayed in the addressbar, allowing for an attacker to spoof an existing page without the malicious page's address being displayed correctly. This vulnerability affects Firefox < 52.
Una URL "javascript:" cargada por una página maliciosa puede ofuscar su ubicación dejando en blanco la URL mostrada en la barra de direcciones, lo que permite que un atacante suplante una página existente sin que la dirección maliciosa de la página se muestre correctamente. La vulnerabilidad afecta a Firefox en versiones anteriores a la 52.
USN-3216-1 fixed vulnerabilities in Firefox. The update resulted in a startup crash when Firefox is used with XRDP. This update fixes the problem. Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to bypass same origin restrictions, obtain sensitive information, spoof the addressbar, spoof the print dialog, cause a denial of service via application crash or hang, or execute arbitrary code. Various other issues were also addressed.