Skip to content

Possible Stored XSS via attacker controlled `sourceURL` parameter of profile data

Low
julienw published GHSA-v3m5-6r68-h4vf May 16, 2025

Package

No package listed

Affected versions

before commit 1bdf3017e190c4d35149126a24f8c9828fe8223f

Patched versions

None

Description

This advisory is a courtesy advisory for downstream users of the Firefox Profiler software, i.e. for maintainers of forks of the profiler, and for maintainers of custom / internal deployments of the profiler. There is no security impact for users of the official deployment of the Firefox Profiler at https://profiler.firefox.com/.

The actual impact of this issue for each downstream deployment depends on the specifics of that deployment, in particular on the CSP that the profiler is served with, and on what information is accessible by code running within the profiler. Downstream maintainers are encouraged to create their own advisories with accurate impact descriptions.

Impact

A Stored XSS vulnerability was found in the handling of the sourceURL value in the profile data. When displaying an attacker-controlled profile file containing a javascript: sourceURL value, the Firefox Profiler would create a "Build ID" link in the Profile Info panel (visible at the top right of the Profiler UI) with this attacker-controlled URL. On deployments of the profiler without an effective CSP, clicking this link would execute the attacker-controlled code in the javascript: URL.

image

Users of profiler.firefox.com are not impacted because this deployment of the Firefox Profiler uses a CSP which blocks the attack.

Users of other deployments of the Firefox Profiler, e.g. of company-internal deployments or of Firefox profiler forks, may be affected if those deployments do not use an effective CSP which disallows javascript URLs.
If such deployments exist, until these deployments are updated with the fix, users of them are asked to carefully look at the link target on the revision value (the Build ID line) in the Profile Info panel before clicking on it. The link target will always show up as a tooltip.

Patches

The problem has been patched and the new version has been deployed to https://profiler.firefox.com. We encourage all deployments of the Firefox Profiler or of its forks to update their server with the patch in PR #5454.

References

#5454

Credits

Thank you Islam Rzayev (github: @parantheses, HackerOne: parantheses) for reporting the issue to us.

Severity

Low

CVE ID

No known CVE

Weaknesses

No CWEs

Credits