If a page is loaded from an original site through a hyperlink and contains a redirect to a "data:text/html" URL, triggering a reload will run the reloaded "data:text/html" page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
https://www.mozilla.org/security/advisories/mfsa2017-13/
https://www.mozilla.org/security/advisories/mfsa2017-12/
https://www.mozilla.org/security/advisories/mfsa2017-10/
https://bugzilla.mozilla.org/show_bug.cgi?id=1353975
https://access.redhat.com/errata/RHSA-2017:1201
https://access.redhat.com/errata/RHSA-2017:1106