First published: Tue Dec 13 2016(Updated: )
HTML tags received from the Pocket server will be processed without sanitization and any JavaScript code executed will be run in the about:pocket-saved (unprivileged) page, giving it access to Pocket's messaging API through HTML injection.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <50.1 | 50.1 |
Red Hat Enterprise Linux | =7.3 | |
Red Hat Enterprise Linux | =7.4 | |
Red Hat Enterprise Linux Desktop | =5.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.3 | |
Red Hat Enterprise Linux Server EUS | =7.4 | |
Red Hat Enterprise Linux Server EUS | =7.5 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =5.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Firefox | <50.1 | |
Firefox ESR | <45.6.0 | |
Firefox ESR | <45.6 | 45.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2016-9901 has a moderate severity level due to HTML injection risks that can lead to unauthorized access to the messaging API.
To fix CVE-2016-9901, update affected software to versions above Firefox ESR 45.6 or Firefox 50.1.
CVE-2016-9901 affects Mozilla Firefox and Mozilla Firefox ESR versions up to 45.6 and 50.1 respectively.
The risks involve potential HTML injection that allows execution of JavaScript in an unprivileged context, impacting user security.
There are no specific workarounds for CVE-2016-9901; updating to the latest version is the best mitigation.