If a page is loaded from an original site through a hyperlink and contains a redirect to a "data:text/html" URL, triggering a reload will run the reloaded "data:text/html" page with its origin set incorrectly. This allows for a cross-site scripting (XSS) attack. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2017:1106 | third party advisory vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2017-12/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1353975 | patch exploit vendor advisory issue tracking |
https://www.mozilla.org/security/advisories/mfsa2017-10/ | vendor advisory |
http://www.securityfocus.com/bid/97940 | third party advisory vdb entry |
https://www.mozilla.org/security/advisories/mfsa2017-13/ | vendor advisory |
http://www.securitytracker.com/id/1038320 | third party advisory vdb entry |
https://access.redhat.com/errata/RHSA-2017:1201 | third party advisory vendor advisory |