We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5.
Reserved 2024-11-25 | Published 2024-11-26 | Updated 2024-11-27 | Assigner mozillaCSP Bypass and XSS Exposure via Web Compatibility Shims
Masato Kinugawa
bugzilla.mozilla.org/show_bug.cgi?id=1924167
www.mozilla.org/security/advisories/mfsa2024-63/
www.mozilla.org/security/advisories/mfsa2024-64/
www.mozilla.org/security/advisories/mfsa2024-65/
www.mozilla.org/security/advisories/mfsa2024-67/
www.mozilla.org/security/advisories/mfsa2024-68/
Support options