CVE-2017-5451
Published: 20 April 2017
A mechanism to spoof the addressbar through the user interaction on the addressbar and the "onblur" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
Priority
Status
Package | Release | Status |
---|---|---|
firefox
Launchpad, Ubuntu, Debian |
precise |
Ignored
|
trusty |
Released
(53.0+build6-0ubuntu0.14.04.1)
|
|
upstream |
Released
(53.0)
|
|
xenial |
Released
(53.0+build6-0ubuntu0.16.04.1)
|
|
yakkety |
Released
(53.0+build6-0ubuntu0.16.10.1)
|
|
zesty |
Released
(53.0+build6-0ubuntu0.17.04.1)
|
|
thunderbird
Launchpad, Ubuntu, Debian |
precise |
Ignored
(end of life)
|
trusty |
Released
(1:52.1.1+build1-0ubuntu0.14.04.1)
|
|
upstream |
Released
(52.1.1)
|
|
xenial |
Released
(1:52.1.1+build1-0ubuntu0.16.04.1)
|
|
yakkety |
Released
(1:52.1.1+build1-0ubuntu0.16.10.1)
|
|
zesty |
Released
(1:52.1.1+build1-0ubuntu0.17.04.1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 4.3 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N |