First published: Thu Sep 28 2017(Updated: )
If web content on a page is dragged onto portions of the browser UI, such as the tab bar, links can be opened that otherwise would not be allowed to open. This can allow malicious web content to open a locally stored file through "file:" URLs. This vulnerability affects Firefox < 56.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <56 | 56 |
Mozilla Firefox | <=55.0.3 | |
debian/firefox | 131.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The severity of CVE-2017-7812 is medium with a severity value of 5.3.
CVE-2017-7812 affects Firefox versions up to and excluding 56.
Malicious web content can exploit CVE-2017-7812 by opening locally stored files through "file:" URLs when dragged onto portions of the Firefox UI, such as the tab bar.
The remedy for CVE-2017-7812 in Firefox is to update to version 56 or higher.
You can find more information about CVE-2017-7812 at the following references: [Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1379842), [Mozilla Security Advisory](https://www.mozilla.org/en-US/security/advisories/mfsa2017-21/), and [SecurityFocus](http://www.securityfocus.com/bid/101057).