First published: Tue Mar 04 2025(Updated: )
A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8.
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <136 | |
Firefox ESR | <128.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2349792 is considered high due to the potential for phishing attacks.
To fix REDHAT-BUG-2349792, update Firefox to the latest version or upgrade to Firefox ESR 128.8 or higher.
REDHAT-BUG-2349792 affects Mozilla Firefox versions prior to 136 and Firefox ESR versions prior to 128.8.
The impact of REDHAT-BUG-2349792 allows a malicious web page to set itself as the default handler for custom URL protocols.
REDHAT-BUG-2349792 is not as common but poses significant risks to users who may be tricked into changing their default settings.