CVE-2017-7815 PUBLISHED

On pages containing an iframe, the "data:" protocol can be used to create a modal dialog through Javascript that will have an arbitrary domains as the dialog's location, spoofing of the origin of the modal dialog from the user view. Note: This attack only affects installations with e10 multiprocess turned off. Installations with e10s turned on do not support the modal dialog functionality. This vulnerability affects Firefox < 56.

EPSS 0.81% · 74.1th percentile

Risk Scores

EPSS Score
0.81%
74.1th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSfirefox0, 41.0.2+build2-0ubuntu1, 42.0+build2-0ubuntu1
Ubuntu:18.04:LTSfirefox0
Ubuntu:14.04:LTSfirefox41.0.2+build2-0ubuntu0.14.04.1, 42.0+build2-0ubuntu0.14.04.1, 43.0+build1-0ubuntu0.14.04.1

Timeline

References

Open in Interactive Console →