First published: Tue Nov 14 2017(Updated: )
JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <57 | 57 |
Mozilla Firefox | <=56.0.2 | |
debian/firefox | 131.0.2-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-7840 is a vulnerability that allows JavaScript code to be injected into an exported bookmarks file.
CVE-2017-7840 works by placing JavaScript code into user-supplied tags in saved bookmarks, which is then executed when the exported HTML file is opened in a browser.
Mozilla Firefox versions up to 57.0.1 and Ubuntu Firefox versions up to 57.0+ are affected by CVE-2017-7840.
CVE-2017-7840 has a severity rating of 6.1 (medium).
To fix CVE-2017-7840, it is recommended to update Mozilla Firefox to version 57.0.2 or later, or update Ubuntu Firefox to version 57.0.2 or later.