When a new protocol handler is registered, the API accepts a title argument which can be used to mislead users about which domain is registering the new protocol. This may result in the user approving a protocol handler that they otherwise would not have. This vulnerability affects Firefox < 63.
http://www.securityfocus.com/bid/105721
http://www.securitytracker.com/id/1041944
https://bugzilla.mozilla.org/show_bug.cgi?id=1490276
Source: MITRE
Published: 2019-02-28
Updated: 2019-03-01
Type: CWE-287
Base Score: 4.3
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N
Impact Score: 2.9
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 4.3
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Impact Score: 1.4
Exploitability Score: 2.8
Severity: MEDIUM