CVE-2017-5466 PUBLISHED

If a page is loaded from an original site through a hyperlink and contains a redirect to a "data:text/html" URL, triggering a reload will run the reloaded "data:text/html" page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.

EPSS 0.62% · 70.0th percentile

Risk Scores

EPSS Score
0.62%
70.0th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSthunderbird1:45.8.0+build1-0ubuntu0.16.04.1, 1:45.7.0+build1-0ubuntu0.16.04.1, 1:45.5.1+build1-0ubuntu0.16.04.1
Ubuntu:14.04:LTSthunderbird1:31.2.0+build2-0ubuntu0.14.04.1, 1:31.3.0+build1-0ubuntu0.14.04.1, 1:31.4.0+build1-0ubuntu0.14.04.1
Ubuntu:14.04:LTSfirefox49.0+build4-0ubuntu0.14.04.1, 49.0.2+build2-0ubuntu0.14.04.1, 50.0+build2-0ubuntu0.14.04.2
Ubuntu:16.04:LTSfirefox48.0+build2-0ubuntu0.16.04.1, 49.0+build4-0ubuntu0.16.04.1, 49.0.2+build2-0ubuntu0.16.04.2

Timeline

References

Open in Interactive Console →