The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | * | 40.0.2 (including) |
Firefox | Mozilla | 38.0 (including) | 38.0 (including) |
Firefox | Mozilla | 38.0.1 (including) | 38.0.1 (including) |
Firefox | Mozilla | 38.0.5 (including) | 38.0.5 (including) |
Firefox | Mozilla | 38.1.0 (including) | 38.1.0 (including) |
Firefox | Mozilla | 38.2.0 (including) | 38.2.0 (including) |
Red Hat Enterprise Linux 5 | RedHat | firefox-0:38.2.1-1.el5_11 | * |
Red Hat Enterprise Linux 6 | RedHat | firefox-0:38.2.1-1.el6_7 | * |
Red Hat Enterprise Linux 7 | RedHat | firefox-0:38.2.1-1.ael7b_1 | * |
Firefox | Ubuntu | devel | * |
Firefox | Ubuntu | precise | * |
Firefox | Ubuntu | trusty | * |
Firefox | Ubuntu | upstream | * |
Firefox | Ubuntu | vivid | * |