CVE-2017-7814

MEDIUM

Description

File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.

References

http://www.securityfocus.com/bid/101059

http://www.securitytracker.com/id/1039465

https://access.redhat.com/errata/RHSA-2017:2831

https://access.redhat.com/errata/RHSA-2017:2885

https://bugzilla.mozilla.org/show_bug.cgi?id=1376036

https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html

https://security.gentoo.org/glsa/201803-14

https://www.debian.org/security/2017/dsa-3987

https://www.debian.org/security/2017/dsa-4014

https://www.mozilla.org/security/advisories/mfsa2017-21/

https://www.mozilla.org/security/advisories/mfsa2017-22/

https://www.mozilla.org/security/advisories/mfsa2017-23/

Details

Source: MITRE

Published: 2018-06-11

Updated: 2018-08-06

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 6.8

Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P)

Impact Score: 6.4

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3.0

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1.8

Severity: HIGH