Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-7783Improper Input Validation in Mozilla Firefox

Severity
7.5HIGHNVD
OSV9.1
EPSS
6.9%
top 8.58%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 11
Latest updateMay 14

Description

If a long user name is used in a username/password combination in a site URL (such as " http://UserName:[email protected]"), the resulting modal prompt will hang in a non-responsive state or crash, causing a denial of service. This vulnerability affects Firefox < 55.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

debiandebian/firefox< firefox 55.0-1 (sid)
CVEListV5mozilla/firefoxunspecified55
NVDmozilla/firefox< 55.0
Ubuntumozilla/firefox< 55.0.1+build2-0ubuntu0.14.04.2+3

Patches

🔴Vulnerability Details

5
GHSA
GHSA-ch5f-5368-9hw8: If a long user name is used in a username/password combination in a site URL (such as " http://UserName:Password@example2022-05-14
OSV
firefox regression2017-08-17
OSV
ubufox update2017-08-16
OSV
firefox vulnerabilities2017-08-15
OSV
CVE-2017-7783: If a long user name is used in a username/password combination in a site URL (such as " http://UserName:Password@example2017-08-10

💥Exploits & PoCs

1
Exploit-DB
Mozilla Firefox < 55 - Denial of Service2017-10-20

📋Vendor Advisories

5
Ubuntu
Firefox regression2017-08-17
Ubuntu
Ubufox update2017-08-16
Ubuntu
Firefox vulnerabilities2017-08-15
Red Hat
Mozilla: DOS attack through long username in URL (MFSA 2017-18)2017-08-08
Debian
CVE-2017-7783: firefox - If a long user name is used in a username/password combination in a site URL (su...2017

💬Community

2
Bugzilla
CVE-2017-7783 Mozilla: DOS attack through long username in URL (MFSA 2017-18)2017-08-08
Bugzilla
DOS using long Username in URL scheme2017-04-29