Closed Bug 1555481 Opened 5 years ago Closed 5 years ago

Extension Block Request: BatchSerializer

Categories

(Toolkit :: Blocklist Policy Requests, task)

task
Not set
normal

Tracking

()

RESOLVED FIXED

People

(Reporter: zitrobugs, Assigned: Fallen)

Details

Extension name BatchSerializer
Extension versions affected <all versions>
Platforms affected <all platforms>
Block severity hard

Reason

Remote script injection
(Clone of https://bugzilla.mozilla.org/show_bug.cgi?id=1543047 )

Extension IDs

{2a34eba4-2a55-4863-91a6-c389d8e108c9}
Assignee: nobody → philipp
Status: NEW → ASSIGNED

Some clones:

{3d35fa06-3f8e-457c-9ffa-a115f33e8e7b}
{fd834065-2938-4522-ae8c-55592bf7e870}
{d52afc01-3504-45eb-aa06-3fa55d2dc7cd}
{2a34eba4-2a55-4863-91a6-c389d8e108c9}
{45082e42-ceef-4df8-9f27-b5adf766ed8d}
{8f77cfd1-6eee-4489-93d0-ae8627d8211d}

I’ve reviewed the add-ons and confirmed they are executing remote code.

The block has been staged. Andreas, can you review and push?

Flags: needinfo?(awagner)

Done

Group: blocklist-requests
Status: ASSIGNED → RESOLVED
Closed: 5 years ago
Flags: needinfo?(awagner)
Resolution: --- → FIXED
You need to log in before you can comment on or make changes to this bug.