CVE-2017-5389Open Redirect in Mozilla Firefox

CWE-601Open Redirect8 documents5 sources
Severity
6.1MEDIUMNVD
OSV9.8
EPSS
0.4%
top 40.90%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 11
Latest updateMay 14

Description

WebExtensions could use the "mozAddonManager" API by modifying the CSP headers on sites with the appropriate permissions and then using host requests to redirect script loads to a malicious site. This allows a malicious extension to then install additional extensions without explicit user permission. This vulnerability affects Firefox < 51.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages5 packages

debiandebian/firefox< firefox 51.0-1 (sid)
CVEListV5mozilla/firefoxunspecified51
NVDmozilla/firefox< 51.0
debiandebian/firefox-esr< firefox 51.0-1 (sid)
Ubuntumozilla/firefox< 51.0.1+build2-0ubuntu0.14.04.1+3

Patches

🔴Vulnerability Details

4
GHSA
GHSA-xmc5-26p9-v4x6: WebExtensions could use the "mozAddonManager" API by modifying the CSP headers on sites with the appropriate permissions and then using host requests2022-05-14
OSV
firefox regression2017-02-06
OSV
firefox vulnerabilities2017-01-27
OSV
CVE-2017-5389: WebExtensions could use the "mozAddonManager" API by modifying the CSP headers on sites with the appropriate permissions and then using host requests2017-01-25

📋Vendor Advisories

3
Ubuntu
Firefox regression2017-02-06
Ubuntu
Firefox vulnerabilities2017-01-27
Debian
CVE-2017-5389: firefox - WebExtensions could use the "mozAddonManager" API by modifying the CSP headers o...2017