CVE-2017-7814

high

Description

File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.

References

https://www.mozilla.org/security/advisories/mfsa2017-23/

https://www.mozilla.org/security/advisories/mfsa2017-22/

https://www.mozilla.org/security/advisories/mfsa2017-21/

https://www.debian.org/security/2017/dsa-4014

https://www.debian.org/security/2017/dsa-3987

https://security.gentoo.org/glsa/201803-14

https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html

https://bugzilla.mozilla.org/show_bug.cgi?id=1376036

https://access.redhat.com/errata/RHSA-2017:2885

https://access.redhat.com/errata/RHSA-2017:2831

http://www.securitytracker.com/id/1039465

http://www.securityfocus.com/bid/101059

Details

Source: Mitre, NVD

Published: 2018-06-11

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High