Vulnerability Description
A mechanism to spoof the Firefox for Android addressbar using a "javascript:" URI. On Firefox for Android, the base domain is parsed incorrectly, making the resulting location less visibly a spoofed site and showing an incorrect domain in appended notifications. This vulnerability affects Firefox < 53.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | < 53.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/97940Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038320Third Party AdvisoryVDB Entry
- https://bugzilla.mozilla.org/show_bug.cgi?id=1325955ExploitIssue Tracking
- https://www.mozilla.org/security/advisories/mfsa2017-10/Vendor Advisory
- http://www.securityfocus.com/bid/97940Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038320Third Party AdvisoryVDB Entry
- https://bugzilla.mozilla.org/show_bug.cgi?id=1325955ExploitIssue Tracking
- https://www.mozilla.org/security/advisories/mfsa2017-10/Vendor Advisory
FAQ
What is CVE-2017-5450?
CVE-2017-5450 is a vulnerability with a CVSS score of 7.5 (HIGH). A mechanism to spoof the Firefox for Android addressbar using a "javascript:" URI. On Firefox for Android, the base domain is parsed incorrectly, making the resulting location less visibly a spoofed s...
How severe is CVE-2017-5450?
CVE-2017-5450 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-5450?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox.