First published: Tue Nov 26 2024(Updated: )
Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5.
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <133 | |
Firefox ESR | <128.5<115.18 | |
Thunderbird | <133 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2328941 is critical due to the potential for DOM-based XSS and frame-src bypass.
To fix REDHAT-BUG-2328941, update your affected software to the latest version as recommended by the vendor.
REDHAT-BUG-2328941 affects Mozilla Firefox versions up to 133, Mozilla Firefox ESR versions up to 128.5 and 115.18, and Mozilla Thunderbird versions up to 133.
The implications of REDHAT-BUG-2328941 include exposure to malicious frames that could lead to data theft or other security incidents.
Currently, a specific workaround for REDHAT-BUG-2328941 has not been documented, so updating the software is the recommended action.