The Content Security Policy (CSP) functionality in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly restrict the strings placed into the blocked-uri parameter of a violation report, which allows remote web servers to capture OpenID credentials and OAuth 2.0 access tokens by triggering a violation.
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17056
https://bugzilla.mozilla.org/show_bug.cgi?id=767778
http://www.ubuntu.com/usn/USN-1510-1
http://www.ubuntu.com/usn/USN-1509-2
http://www.ubuntu.com/usn/USN-1509-1
http://www.securitytracker.com/id?1027258
http://www.securitytracker.com/id?1027257
http://www.securitytracker.com/id?1027256
http://www.securityfocus.com/bid/54582
http://www.mozilla.org/security/announce/2012/mfsa2012-53.html
http://secunia.com/advisories/49994
http://secunia.com/advisories/49993
http://secunia.com/advisories/49992
http://secunia.com/advisories/49979
http://secunia.com/advisories/49977
http://secunia.com/advisories/49972
http://secunia.com/advisories/49968
http://secunia.com/advisories/49965
http://rhn.redhat.com/errata/RHSA-2012-1088.html
http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00016.html
http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00013.html
http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00012.html
http://lists.opensuse.org/opensuse-security-announce/2012-07/msg00011.html