First published: Wed Apr 19 2017(Updated: )
A mechanism to spoof the addressbar through the user interaction on the addressbar and the "onblur" event. The event could be used by script to affect text display to make the loaded site appear to be different from the one actually loaded within the addressbar. This vulnerability affects Thunderbird < 52.1, Firefox ESR < 52.1, and Firefox < 53.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Thunderbird | <52.1 | 52.1 |
Mozilla Firefox ESR | <52.1 | 52.1 |
Mozilla Firefox | <53 | 53 |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.5 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Mozilla Firefox | <53.0 | |
Mozilla Firefox ESR | <52.1.0 | |
Mozilla Thunderbird | <52.1.0 | |
debian/firefox | 135.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-5451 is categorized as a moderate severity vulnerability.
To fix CVE-2017-5451, update your Mozilla Thunderbird, Firefox ESR, or Firefox to the latest version beyond the affected versions.
CVE-2017-5451 affects Mozilla Thunderbird versions up to 52.1.
CVE-2017-5451 impacts Firefox versions up to 53 and Firefox ESR versions up to 52.1.
Yes, CVE-2017-5451 is a user interaction vulnerability that allows spoofing of the address bar.