You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
According to that paper malicious extensions can bypass the Mozilla vetting process and can misuse other installed extensions, one of them Noscript. uBlock0 and uMatrix are not mentioned in that paper, but perhaps you want to check if they are affected by using the tool mentioned in that paper.
The text was updated successfully, but these errors were encountered:
Reportedly Mozilla reviewers were given the source code of the static analysis tool, and they will use it to review add-ons. If there is an issue with uBO, Mozilla reviewers will provide feedback.
@gorhill: This post is meant to inform you about a paper that presents a new vulnerability targeting Firefox extensions:
https://www.internetsociety.org/sites/default/files/blogs-media/crossfire-analysis-firefox-extension-reuse-vulnerabilities.pdf
According to that paper malicious extensions can bypass the Mozilla vetting process and can misuse other installed extensions, one of them Noscript. uBlock0 and uMatrix are not mentioned in that paper, but perhaps you want to check if they are affected by using the tool mentioned in that paper.
The text was updated successfully, but these errors were encountered: