If the "app.support.baseURL" preference is changed by a malicious local program to contain HTML and script content, this content is not sanitized. It will be executed if a user loads "chrome://browser/content/preferences/in-content/preferences.xul" directly in a tab and executes a search. This stored preference is also executed whenever an EME video player plugin displays a CDM-disabled message as a notification message. This vulnerability affects Firefox < 59.
https://www.mozilla.org/security/advisories/mfsa2018-06/
https://usn.ubuntu.com/3596-1/
https://bugzilla.mozilla.org/show_bug.cgi?id=1430974
https://bugzilla.mozilla.org/show_bug.cgi?id=1430511