CVE-2017-5420
Published: 7 March 2017
A "javascript:" url loaded by a malicious page can obfuscate its location by blanking the URL displayed in the addressbar, allowing for an attacker to spoof an existing page without the malicious page's address being displayed correctly. This vulnerability affects Firefox < 52.
Priority
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
precise |
Released
(52.0+build2-0ubuntu0.12.04.1)
|
trusty |
Released
(52.0+build2-0ubuntu0.14.04.1)
|
|
upstream |
Released
(52.0)
|
|
xenial |
Released
(52.0+build2-0ubuntu0.16.04.1)
|
|
yakkety |
Released
(52.0+build2-0ubuntu0.16.10.1)
|
|
zesty |
Released
(52.0.1+build2-0ubuntu1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 6.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | High |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N |