An attack can use a blob URL and script to spoof an arbitrary addressbar URL prefaced by "blob:" as the protocol, leading to user confusion and further spoofing attacks. This vulnerability affects Firefox < 52.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2017-05/ | vendor advisory |
http://www.securitytracker.com/id/1037966 | vdb entry third party advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1321719 | issue tracking exploit patch |
http://www.securityfocus.com/bid/96692 | vdb entry third party advisory |