First published: Tue Jan 24 2017(Updated: )
Proxy Auto-Config (PAC) files can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <51 | 51 |
Firefox | <51.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-5384 is classified as a medium severity vulnerability.
To fix CVE-2017-5384, upgrade to Mozilla Firefox version 52 or later.
CVE-2017-5384 affects Mozilla Firefox versions prior to 52.
CVE-2017-5384 is a vulnerability in Proxy Auto-Config files that can expose sensitive URL information.
CVE-2017-5384 can compromise users' privacy by leaking full HTTPS URL paths to the proxy.