An attacker could have sent a message to the parent process where the contents were used to double-index into a JavaScript object, leading to prototype pollution and ultimately attacker-controlled JavaScript executing in the privileged parent process. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1.
2022-12-22T20:15:13.327
2025-04-16T16:15:20.683
Modified
CVSSv3.1: 8.8 (HIGH)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | mozilla | firefox | < 100.0.2 | Yes |
| Application | mozilla | firefox_esr | < 91.9.1 | Yes |
| Application | mozilla | thunderbird | < 91.9.1 | Yes |
| Application | mozilla | firefox | < 100.3.0 | Yes |
| Operating System | android | - | No |