When entered directly, Reader Mode did not strip the username and password section of URLs displayed in the addressbar. This can be used for spoofing the domain of the current page. This vulnerability affects Firefox < 54.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2018:2112 | third party advisory vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2017-15/ | vendor advisory |
http://www.securitytracker.com/id/1038689 | third party advisory vdb entry |
https://access.redhat.com/errata/RHSA-2018:2113 | third party advisory vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1358248 | patch issue tracking exploit |
http://www.securityfocus.com/bid/99047 | third party advisory vdb entry |