A malicious extension with the 'search' permission could have installed a new search engine whose favicon referenced a cross-origin URL. The response to this cross-origin request could have been read by the extension, allowing a same-origin policy bypass by the extension, which should not have cross-origin permissions. This cross-origin request was made without cookies, so the sensitive information disclosed by the violation was limited to local-network resources or resources that perform IP-based authentication. This vulnerability affects Firefox < 87.
Una extensión maliciosa con el permiso de "search" podría haber instalado un nuevo motor de búsqueda cuyo favicon hiciera referencia a una URL de origen cruzado. La respuesta a esta petición de origen cruzado podría haber sido leída por la extensión, permitiendo a la extensión omitir la política del mismo origen, que no debería tener permisos de origen cruzado. Esta petición de origen cruzado fue hecha sin cookies, por lo que la información confidencial divulgada por la infracción se limitó a los recursos de la red local o los recursos que llevan a cabo la autenticación basada en IP. Esta vulnerabilidad afecta a Firefox versiones anteriores a 87.
Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, or execute arbitrary code. It was discovered that extensions could open popup windows with control of the window title in some circumstances. If a user were tricked into installing a specially crafted extension, an attacker could potentially exploit this to spook a website and trick the user into providing credentials. Various other issues were also addressed.