The add-on installation feature in Mozilla Firefox prior to 40.0.3 and Firefox ESR 38.x prior to 38.2.1 allows remote malicious users to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
mozilla firefox esr 38.2.0 |
||
mozilla firefox |
||
mozilla firefox esr 38.0 |
||
mozilla firefox esr 38.0.1 |
||
mozilla firefox esr 38.0.5 |
||
mozilla firefox esr 38.1.0 |