Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-5415Improper Input Validation in Mozilla Firefox

Severity
5.3MEDIUMNVD
OSV9.8
EPSS
29.2%
top 3.40%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 11
Latest updateMay 14

Description

An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by "blob:" as the protocol, leading to user confusion and further spoofing attacks. This vulnerability affects Firefox < 52.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages4 packages

debiandebian/firefox< firefox 52.0-1 (sid)
CVEListV5mozilla/firefoxunspecified52
NVDmozilla/firefox< 52.0
Ubuntumozilla/firefox< 52.0+build2-0ubuntu0.14.04.1+3

Patches

🔴Vulnerability Details

4
GHSA
GHSA-xmh3-55xm-hpg9: An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by "blob:" as the protocol, leading to user confusion and furthe2022-05-14
OSV
firefox regression2017-03-30
OSV
firefox vulnerabilities2017-03-07
OSV
CVE-2017-5415: An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by "blob:" as the protocol, leading to user confusion and furthe2017-03-07

💥Exploits & PoCs

1
Exploit-DB
Mozilla Firefox - Address Bar Spoofing2017-04-14

📋Vendor Advisories

3
Ubuntu
Firefox regression2017-03-30
Ubuntu
Firefox vulnerabilities2017-03-07
Debian
CVE-2017-5415: firefox - An attack can use a blob URL and script to spoof an arbitrary addressbar URL pre...2017