Closed Bug 1539514 Opened 5 years ago Closed 5 years ago

Extension block request: {a9c33302-4c97-11e9-9a9d-af400df725e1}

Categories

(Toolkit :: Blocklist Policy Requests, task)

task
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: rayadohanu, Assigned: raluca.sofian)

Details

Extension name: Security
Extension UUID: {a9c33302-4c97-11e9-9a9d-af400df725e1}
Extension versions to block: 4.2.4
Applications, versions, and platforms affected:
Block severity: (hard/soft)

Homepage, AMO listing, other references and contact info:

Reasons:
maybe remote code injection,
similar: https://bugzilla.mozilla.org/show_bug.cgi?id=1538141

Assignee: nobody → raluca.sofian
Status: UNCONFIRMED → ASSIGNED
Ever confirmed: true

We don't appreciate reports meant to test reviewers, as this causes additional workload.

Status: ASSIGNED → RESOLVED
Closed: 5 years ago
Resolution: --- → INVALID

This looks like a valid report. Could you please re-check?

Status: RESOLVED → REOPENED
Resolution: INVALID → ---

Hello :),
for you to have a lot of work, analyze another code: hxxps://bugzilla.mozilla.org/show_bug.cgi?id=1540999

Same as https://bugzilla.mozilla.org/show_bug.cgi?id=1540113

Blocklist reasons:

  • Remote script injection
Flags: needinfo?(awagner)
Type: enhancement → task

The block has been staged. Philipp, can you please review and push?

Flags: needinfo?(awagner) → needinfo?(philipp)

Done

Status: REOPENED → RESOLVED
Closed: 5 years ago5 years ago
Flags: needinfo?(philipp)
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.