First published: Tue Jun 13 2017(Updated: )
A flaw was found in Firefox versions before 54. When entered directly, Reader Mode did not strip the username and password section of URLs displayed in the address bar. This can be used for spoofing the domain of the current page. References: <a href="https://bugzilla.mozilla.org/show_bug.cgi?id=1358248">https://bugzilla.mozilla.org/show_bug.cgi?id=1358248</a> <a href="https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/">https://www.mozilla.org/en-US/security/advisories/mfsa2017-15/</a> Patch: <a href="https://bugzilla.mozilla.org/attachment.cgi?id=8868506&action=diff">https://bugzilla.mozilla.org/attachment.cgi?id=8868506&action=diff</a>
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/firefox | <54 | 54 |
Firefox | <54 | 54 |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Firefox | <54.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7762 is classified as a moderate severity vulnerability.
CVE-2017-7762 allows Reader Mode in Firefox to display URLs with unstripped username and password sections, leading to potential domain spoofing.
To fix CVE-2017-7762, upgrade Firefox to version 54 or higher.
Firefox versions before 54 are affected by CVE-2017-7762.
CVE-2017-7762 impacts various platforms running affected versions of Firefox, including Red Hat Enterprise Linux Desktop, Server, and Workstation.