Extension Block Request: {fb62e856-f09b-4cbc-ba07-642ab55f6cb4}
Categories
(Toolkit :: Blocklist Policy Requests, task)
Tracking
()
People
(Reporter: zitrobugs, Assigned: TheOne)
Details
Extension name | {fb62e856-f09b-4cbc-ba07-642ab55f6cb4} |
Extension versions affected | <all versions> |
Platforms affected | <all platforms> |
Block severity | hard |
Reason
remote code injection
Extension GUIDs
{fb62e856-f09b-4cbc-ba07-642ab55f6cb4}
EncDNA module 2.0.21
Can you provide the exact page with the installation? Where did you get this add-on?
Reporter | ||
Comment 2•6 years ago
|
||
no, this is not possible because it depends on the referer, cookies and possibly other stuff
But extension is linked on h**p://prosnazzy.cool/ff/encdna_module-2.0.21-fx.xpi
The site encourages installation, but does the additive have bad behavior?
Reporter | ||
Comment 4•6 years ago
|
||
Yes it has! see above. Redirects to other pages. It has remote code injection.
Yes, this plugin loads external code from: https://medicloft.com/alarm/list/2/87e7261a29594db99477.js?nocache=1552512850725. Not all add-ons reported by you they download the external code. Can you show it?
Assignee | ||
Comment 6•6 years ago
|
||
FF, could you please leave triaging to Mozilla admin reviewers? We request information when we need it only. Thank you!
Assignee | ||
Comment 7•6 years ago
|
||
Blocklist reasons:
- Remote script injection
Assignee | ||
Updated•6 years ago
|
Assignee | ||
Comment 8•6 years ago
|
||
The block has been staged. Philipp, can you please review and push?
Comment 9•6 years ago
|
||
Done
Assignee | ||
Updated•6 years ago
|
Description
•