CVE-2017-5422Improper Input Validation in Mozilla Firefox

Severity
7.5HIGHNVD
OSV9.8
EPSS
0.7%
top 27.15%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 11
Latest updateMay 14

Description

If a malicious site uses the "view-source:" protocol in a series within a single hyperlink, it can trigger a non-exploitable browser crash when the hyperlink is selected. This was fixed by no longer making "view-source:" linkable. This vulnerability affects Firefox < 52 and Thunderbird < 52.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages6 packages

debiandebian/firefox< firefox 52.0-1 (sid)
CVEListV5mozilla/firefoxunspecified52
NVDmozilla/firefox< 52.0
CVEListV5mozilla/thunderbirdunspecified52

Patches

🔴Vulnerability Details

4
GHSA
GHSA-2gff-65gq-h5qw: If a malicious site uses the "view-source:" protocol in a series within a single hyperlink, it can trigger a non-exploitable browser crash when the hy2022-05-14
OSV
firefox regression2017-03-30
OSV
firefox vulnerabilities2017-03-07
OSV
CVE-2017-5422: If a malicious site uses the "view-source:" protocol in a series within a single hyperlink, it can trigger a non-exploitable browser crash when the hy2017-03-07

📋Vendor Advisories

3
Ubuntu
Firefox regression2017-03-30
Ubuntu
Firefox vulnerabilities2017-03-07
Debian
CVE-2017-5422: firefox - If a malicious site uses the "view-source:" protocol in a series within a single...2017