Article GQ6K An active Firefox exploit

An active Firefox exploit

by
corbet
from LWN.net on (#GQ6K)
Mozilla has posted awarning about a Firefox vulnerability that is currently being activelyexploited on the net. "The vulnerability comes from the interactionof the mechanism that enforces JavaScript context separation (the 'sameorigin policy') and Firefox's PDF Viewer. Mozilla products that don'tcontain the PDF Viewer, such as Firefox for Android, are notvulnerable. The vulnerability does not enable the execution of arbitrarycode but the exploit was able to inject a JavaScript payload into the localfile context. This allowed it to search for and upload potentiallysensitive local files." There is asecurity update for the problem.
External Content
Source RSS or Atom Feed
Feed Location http://lwn.net/headlines/rss
Feed Title LWN.net
Feed Link https://lwn.net/
Reply 0 comments