Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-5389

Опубликовано: 11 июн. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.8
CVSS3: 6.1

Описание

WebExtensions could use the "mozAddonManager" API by modifying the CSP headers on sites with the appropriate permissions and then using host requests to redirect script loads to a malicious site. This allows a malicious extension to then install additional extensions without explicit user permission. This vulnerability affects Firefox < 51.

РелизСтатусПримечание
devel

not-affected

51.0.1+build2-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [51.0.1+build2-0ubuntu0.14.04.1]]
precise

released

51.0.1+build2-0ubuntu0.12.04.1
trusty

released

51.0.1+build2-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [51.0.1+build2-0ubuntu0.14.04.1]
upstream

released

51
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

released

51.0.1+build2-0ubuntu0.16.04.1
yakkety

released

51.0.1+build2-0ubuntu0.16.10.1

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
precise

not-affected

trusty

not-affected

trusty/esm

DNE

trusty was not-affected
upstream

not-affected

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

not-affected

yakkety

not-affected

Показывать по

EPSS

Процентиль: 62%
0.0043
Низкий

5.8 Medium

CVSS2

6.1 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.1
nvd
около 7 лет назад

WebExtensions could use the "mozAddonManager" API by modifying the CSP headers on sites with the appropriate permissions and then using host requests to redirect script loads to a malicious site. This allows a malicious extension to then install additional extensions without explicit user permission. This vulnerability affects Firefox < 51.

CVSS3: 6.1
debian
около 7 лет назад

WebExtensions could use the "mozAddonManager" API by modifying the CSP ...

CVSS3: 6.1
github
около 3 лет назад

WebExtensions could use the "mozAddonManager" API by modifying the CSP headers on sites with the appropriate permissions and then using host requests to redirect script loads to a malicious site. This allows a malicious extension to then install additional extensions without explicit user permission. This vulnerability affects Firefox < 51.

suse-cvrf
больше 8 лет назад

Security update for MozillaFirefox

EPSS

Процентиль: 62%
0.0043
Низкий

5.8 Medium

CVSS2

6.1 Medium

CVSS3

Уязвимость CVE-2017-5389