A compromised content process could send a message to the parent process that would cause the Click to Play permission prompt to be shown. However, due to lack of validation from the parent process, if the user accepted the permission request an attacker-controlled permission would be granted rather than the Click to Play permission. This vulnerability affects Firefox < 70.
During installation, installed file permissions are set to allow anyone to modify those files.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | * | 70.0 (excluding) |
Firefox | Ubuntu | bionic | * |
Firefox | Ubuntu | devel | * |
Firefox | Ubuntu | disco | * |
Firefox | Ubuntu | eoan | * |
Firefox | Ubuntu | focal | * |
Firefox | Ubuntu | groovy | * |
Firefox | Ubuntu | hirsute | * |
Firefox | Ubuntu | impish | * |
Firefox | Ubuntu | jammy | * |
Firefox | Ubuntu | kinetic | * |
Firefox | Ubuntu | lunar | * |
Firefox | Ubuntu | mantic | * |
Firefox | Ubuntu | noble | * |
Firefox | Ubuntu | trusty | * |
Firefox | Ubuntu | upstream | * |
Firefox | Ubuntu | xenial | * |
Mozjs38 | Ubuntu | bionic | * |
Mozjs38 | Ubuntu | esm-apps/bionic | * |
Mozjs38 | Ubuntu | upstream | * |
Mozjs52 | Ubuntu | bionic | * |
Mozjs52 | Ubuntu | disco | * |
Mozjs52 | Ubuntu | eoan | * |
Mozjs52 | Ubuntu | esm-apps/focal | * |
Mozjs52 | Ubuntu | esm-infra/bionic | * |
Mozjs52 | Ubuntu | focal | * |
Mozjs52 | Ubuntu | groovy | * |
Mozjs52 | Ubuntu | upstream | * |
Mozjs60 | Ubuntu | disco | * |
Mozjs60 | Ubuntu | eoan | * |
Mozjs60 | Ubuntu | upstream | * |