Due to a recent update on Javascript code a full page refresh on your browser might be needed.

Bug 1590493 (CVE-2017-7762)

Summary: CVE-2017-7762 Mozilla: address bar username and password spoofing in reader mode
Product: [Other] Security Response Reporter: Laura Pardo <lpardo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: cschalle, dmoppert, gecko-bugs-nobody, jhorak, stransky
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Fixed In Version: firefox 54 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-10 10:28:47 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 1590495, 1590694, 1590696, 1590697, 1591001    
Bug Blocks: 1590497    

Description Laura Pardo 2018-06-12 16:58:17 UTC
A flaw was found in Firefox versions before 54. When entered directly, Reader Mode did not strip the username and password section of URLs displayed in the address bar. This can be used for spoofing the domain of the current page.



Comment 3 Scott Gayou 2018-06-13 21:15:18 UTC

Red Hat Product Security has rated this issue as having a security impact of Moderate, and a future update may address this flaw.

Comment 6 Doran Moppert 2018-06-28 05:58:13 UTC
External References:


Comment 7 errata-xmlrpc 2018-06-28 16:18:13 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2018:2112 https://access.redhat.com/errata/RHSA-2018:2112

Comment 8 errata-xmlrpc 2018-06-28 16:19:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:2113 https://access.redhat.com/errata/RHSA-2018:2113