First published: Tue Nov 14 2017(Updated: )
A "data:" URL loaded in a new tab did not inherit the Content Security Policy (CSP) of the original page, allowing for bypasses of the policy including the execution of JavaScript. In prior versions when "data:" documents also inherited the context of the original page this would allow for potential cross-site scripting (XSS) attacks. This vulnerability affects Firefox < 57.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <57 | 57 |
Mozilla Firefox | <=56.0.2 | |
debian/firefox | 131.0.2-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7834 refers to a vulnerability in Mozilla Firefox that allows for bypasses of the Content Security Policy (CSP) and the execution of JavaScript.
CVE-2017-7834 affects Mozilla Firefox versions up to and including 57.0.2.
CVE-2017-7834 has a severity rating of medium with a CVSS score of 6.1.
To fix CVE-2017-7834, it is recommended to update Mozilla Firefox to version 57.0.1 or later.
You can find more information about CVE-2017-7834 on the Mozilla Bugzilla and Mozilla Security Advisories websites.