When dragging content from the primary browser pane to the addressbar on a malicious site, it is possible to change the addressbar so that the displayed location following navigation does not match the URL of the newly loaded page. This allows for spoofing attacks. This vulnerability affects Firefox < 52.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=791597 | patch vendor advisory issue tracking |
https://www.mozilla.org/security/advisories/mfsa2017-05/ | vendor advisory |
http://www.securitytracker.com/id/1037966 | third party advisory vdb entry |
http://www.securityfocus.com/bid/96692 | third party advisory vdb entry |