Closed Bug 1841515 Opened 2 years ago Closed 2 years ago

UXss via share data:url

Categories

(Firefox :: Security, defect)

defect

Tracking

()

RESOLVED DUPLICATE of bug 1841516

People

(Reporter: verticaldark17, Unassigned)

References

()

Details

(Keywords: reporter-external, Whiteboard: [reporter-external] [client-bounty-form] [verif?])

Hi team, I found a UXss vulnerability in your android browser, this is affected by the latest version of firefox and nightly.

Payload :
data:text/html;base64,PHNjcmlwdD5hbGVydCgiSGVsbG8iKTs8L3NjcmlwdD4=

Steps and reproduction :

  • The attacker sends the above data:url to the victim
  • The victim opens the data:url above in the firefox browser
  • Victim click enter on search engginne
  • The victim switches to desktop or mobile mode
  • Xss executable

This vulnerability requires 2 interactions, but who would have thought that this vulnerability executes arbitrary javascript and can inject javascript into the victim's browser.

Status: UNCONFIRMED → RESOLVED
Closed: 2 years ago
Duplicate of bug: 1841516
Resolution: --- → DUPLICATE
Group: firefox-core-security
You need to log in before you can comment on or make changes to this bug.