Closed Bug 1554465 Opened 6 years ago Closed 6 years ago

Extension Block Request: LinkT

Categories

(Toolkit :: Blocklist Policy Requests, task)

task
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: zitrobugs, Assigned: Fallen)

Details

Extension name LinkT
Extension versions affected <all versions>
Platforms affected <all platforms>
Block severity hard

Reason

Remote script injection
(Fake from "Link Text and Location Copier" on AMO)

Extension IDs

{9834ff7f-e3ea-485a-b861-801a2e33f822}
Summary: Extension Block Request: LinkT 1.8.5 true {9834ff7f-e3ea-485a-b861-801a2e33f822} → Extension Block Request: LinkT

I’ve reviewed the add-on and confirmed that it is executing remote code.

Assignee: nobody → philipp
Status: NEW → ASSIGNED

The block has been staged. Andreas, can you review and push?

Flags: needinfo?(awagner)

Done

Group: blocklist-requests
Status: ASSIGNED → RESOLVED
Closed: 6 years ago
Flags: needinfo?(awagner)
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.