First published: Tue Dec 13 2016(Updated: )
The Pocket toolbar button, once activated, listens for events fired from it's own pages but does not verify the origin of incoming events. This allows content from other origins to fire events and inject content and commands into the Pocket context. Note: this issue does not affect users with e10s enabled.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <45.6 | 45.6 |
Mozilla Firefox | <50.1 | 50.1 |
Redhat Enterprise Linux Desktop | =5.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Redhat Enterprise Linux Workstation | =5.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Mozilla Firefox | <50.1 | |
Mozilla Firefox ESR | <45.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2016-9902 is classified as a moderate severity vulnerability.
To fix CVE-2016-9902, upgrade to Mozilla Firefox version 50.1 or later, or Firefox ESR version 45.6 or later.
CVE-2016-9902 affects Mozilla Firefox versions up to 50.1 and Firefox ESR versions up to 45.6, as well as certain versions of Red Hat Enterprise Linux.
CVE-2016-9902 is a cross-origin resource injection vulnerability.
CVE-2016-9902 is not considered critical, but it poses potential risks by allowing unauthorized event injection.