Vulnerability Details : CVE-2017-7791
Potential exploit
On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Vulnerability category: Input validation
Products affected by CVE-2017-7791
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-7791
1.38%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-7791
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2017-7791
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-7791
-
https://www.debian.org/security/2017/dsa-3968
Debian -- Security Information -- DSA-3968-1 icedoveThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:2534
RHSA-2017:2534 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://www.mozilla.org/security/advisories/mfsa2017-20/
Security vulnerabilities fixed in Thunderbird 52.3 — MozillaVendor Advisory
-
https://www.mozilla.org/security/advisories/mfsa2017-19/
Security vulnerabilities fixed in Firefox ESR 52.3 — MozillaVendor Advisory
-
https://www.debian.org/security/2017/dsa-3928
Debian -- Security Information -- DSA-3928-1 firefox-esrThird Party Advisory
-
http://www.securityfocus.com/bid/100240
Mozilla Firefox CVE-2017-7791 Security Bypass VulnerabilityThird Party Advisory;VDB Entry
-
https://www.mozilla.org/security/advisories/mfsa2017-18/
Security vulnerabilities fixed in Firefox 55 — MozillaVendor Advisory
-
https://security.gentoo.org/glsa/201803-14
Mozilla Thunderbird: Multiple vulnerabilities (GLSA 201803-14) — Gentoo securityThird Party Advisory
-
http://www.securitytracker.com/id/1039124
Mozilla Firefox Multiple Bugs Let Remote Users Spoof Content, Obtain Potentially Sensitive Information, Deny Service and Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
-
https://bugzilla.mozilla.org/show_bug.cgi?id=1365875
1365875 - (CVE-2017-7791) Firefox allows you to insert confirm/alert/prompt dialog in any domainExploit;Issue Tracking;Patch;Vendor Advisory
-
https://access.redhat.com/errata/RHSA-2017:2456
RHSA-2017:2456 - Security Advisory - Red Hat Customer PortalThird Party Advisory
Jump to