Home

Description

Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, Thunderbird < 128.5, and Thunderbird < 115.18.

PUBLISHED Reserved 2024-11-25 | Published 2024-11-26 | Updated 2025-11-03 | Assigner mozilla

Problem types

CSP Bypass and XSS Exposure via Web Compatibility Shims

Product status

Any version before 133
affected

Any version before 128.5
affected

Any version before 115.18
affected

Any version before 133
affected

Any version before 128.5
affected

Any version before 115.18
affected

Credits

Masato Kinugawa

References

lists.debian.org/debian-lts-announce/2024/11/msg00029.html

bugzilla.mozilla.org/show_bug.cgi?id=1924167

www.mozilla.org/security/advisories/mfsa2024-63/

www.mozilla.org/security/advisories/mfsa2024-64/

www.mozilla.org/security/advisories/mfsa2024-65/

www.mozilla.org/security/advisories/mfsa2024-67/

www.mozilla.org/security/advisories/mfsa2024-68/

www.mozilla.org/security/advisories/mfsa2024-70/

cve.org (CVE-2024-11694)

nvd.nist.gov (CVE-2024-11694)

Download JSON