CVE-2017-7791 — Improper Input Validation in Mozilla Firefox
Severity
5.3MEDIUMNVD
OSV9.1
EPSS
1.4%
top 19.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 11
Latest updateMay 14
Description
On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages10 packages
Also affects: Debian Linux 8.0, 9.0, Enterprise Linux 5.0, 6.0, 7.0, 7.3, 7.4, 7.5
Patches
🔴Vulnerability Details
7GHSA▶
GHSA-3cqm-5mmm-ggj5: On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigat↗2022-05-14
CVEList▶
CVE-2017-7791: On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigat↗2018-06-11
OSV▶
CVE-2017-7791: On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigat↗2018-06-11
📋Vendor Advisories
6💬Community
1Bugzilla▶
CVE-2017-7791 Mozilla: Spoofing following page navigation with data: protocol and modal alerts (MFSA 2017-19)↗2017-08-08