Closed
Bug 1461410
Opened 7 years ago
Closed 7 years ago
Blocklist malicious add-on with GUID @vkmad
Categories
(Toolkit :: Blocklist Policy Requests, enhancement)
Toolkit
Blocklist Policy Requests
Tracking
()
RESOLVED
FIXED
People
(Reporter: TheOne, Assigned: TheOne)
Details
The author of this add-on added malicious functionality using remote script injection, disguised in sizzle.js
There is also a user report at https://www.reddit.com/r/firefox/comments/8jcubq/is_it_ok_for_addon_with_47k_users_to_inject/
We should probably block the entire add-on, since most users have updated to the latest version anyway and others will be stranded on an old version otherwise, without any notice.
Assignee | ||
Updated•7 years ago
|
Assignee: nobody → awagner
Comment 1•7 years ago
|
||
Reviewed and pushed the block
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → FIXED
You need to log in
before you can comment on or make changes to this bug.
Description
•