First published: Tue Aug 08 2017(Updated: )
If a server sends two Strict-Transport-Security (STS) headers for a single connection, they will be rejected as invalid and HTTP Strict Transport Security (HSTS) will not be enabled for the connection.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <55 | 55 |
Firefox | <55.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7789 is considered a moderate severity vulnerability affecting Firefox versions up to 55.
To fix CVE-2017-7789, users should upgrade to Mozilla Firefox version 56 or later.
CVE-2017-7789 affects Mozilla Firefox versions prior to 56, specifically relating to Strict-Transport-Security headers.
If a server sends two Strict-Transport-Security headers, they will be rejected as invalid and HSTS will not be enabled.
There is no specific workaround for CVE-2017-7789 other than upgrading to a secure version of Firefox.