File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Type | CWE ID | Description |
---|---|---|
text | N/A | Blob and data URLs bypass phishing and malware protection warnings |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/bid/101059 | vdb-entry x_refsource_BID |
https://lists.debian.org/debian-lts-announce/2017/11/msg00000.html | mailing-list x_refsource_MLIST |
https://www.mozilla.org/security/advisories/mfsa2017-22/ | x_refsource_CONFIRM |
http://www.securitytracker.com/id/1039465 | vdb-entry x_refsource_SECTRACK |
https://access.redhat.com/errata/RHSA-2017:2831 | vendor-advisory x_refsource_REDHAT |
https://access.redhat.com/errata/RHSA-2017:2885 | vendor-advisory x_refsource_REDHAT |
https://www.mozilla.org/security/advisories/mfsa2017-21/ | x_refsource_CONFIRM |
https://bugzilla.mozilla.org/show_bug.cgi?id=1376036 | x_refsource_CONFIRM |
https://www.debian.org/security/2017/dsa-4014 | vendor-advisory x_refsource_DEBIAN |
https://www.mozilla.org/security/advisories/mfsa2017-23/ | x_refsource_CONFIRM |
https://www.debian.org/security/2017/dsa-3987 | vendor-advisory x_refsource_DEBIAN |
https://security.gentoo.org/glsa/201803-14 | vendor-advisory x_refsource_GENTOO |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.0 | 7.8 | HIGH | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Primary | 2.0 | 6.8 | MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |