CVE-2017-7812
Published: 2 October 2017
If web content on a page is dragged onto portions of the browser UI, such as the tab bar, links can be opened that otherwise would not be allowed to open. This can allow malicious web content to open a locally stored file through "file:" URLs. This vulnerability affects Firefox < 56.
Priority
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
upstream |
Released
(56.0)
|
xenial |
Released
(56.0+build6-0ubuntu0.16.04.1)
|
|
zesty |
Released
(56.0+build6-0ubuntu0.17.04.1)
|
|
artful |
Released
(56.0+build6-0ubuntu1)
|
|
bionic |
Released
(56.0+build6-0ubuntu1)
|
|
trusty |
Released
(56.0+build6-0ubuntu0.14.04.1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |