CVE-2017-7815

Publication date 2 October 2017

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

5.3 · Medium

Score breakdown

On pages containing an iframe, the "data:" protocol can be used to create a modal dialog through Javascript that will have an arbitrary domains as the dialog's location, spoofing of the origin of the modal dialog from the user view. Note: This attack only affects installations with e10 multiprocess turned off. Installations with e10s turned on do not support the modal dialog functionality. This vulnerability affects Firefox < 56.

Status

Package Ubuntu Release Status
firefox 18.04 LTS bionic
Fixed 56.0+build6-0ubuntu1
17.10 artful
Fixed 56.0+build6-0ubuntu1
17.04 zesty
Fixed 56.0+build6-0ubuntu0.17.04.1
16.04 LTS xenial
Fixed 56.0+build6-0ubuntu0.16.04.1
14.04 LTS trusty
Fixed 56.0+build6-0ubuntu0.14.04.1

Severity score breakdown

Parameter Value
Base score 5.3 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact Low
Availability impact None
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

References

Related Ubuntu Security Notices (USN)

    • USN-3435-1
    • Firefox vulnerabilities
    • 2 October 2017

Other references