CVE-2017-7821
Published: 2 October 2017
A vulnerability where WebExtensions can download and attempt to open a file of some non-executable file types. This can be triggered without specific user interaction for the file download and open actions. This could be used to trigger known vulnerabilities in the programs that handle those document types. This vulnerability affects Firefox < 56.
Priority
Status
Package | Release | Status |
---|---|---|
firefox Launchpad, Ubuntu, Debian |
upstream |
Released
(56.0)
|
xenial |
Released
(56.0+build6-0ubuntu0.16.04.1)
|
|
zesty |
Released
(56.0+build6-0ubuntu0.17.04.1)
|
|
artful |
Released
(56.0+build6-0ubuntu1)
|
|
bionic |
Released
(56.0+build6-0ubuntu1)
|
|
trusty |
Released
(56.0+build6-0ubuntu0.14.04.1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 9.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |