On pages containing an iframe, the "data:" protocol can be used to create a modal alert that will render over arbitrary domains following page navigation, spoofing of the origin of the modal alert from the iframe content. This vulnerability affects Thunderbird < 52.3, Firefox ESR < 52.3, and Firefox < 55.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
debian debian linux 8.0 |
||
debian debian linux 9.0 |
||
redhat enterprise linux 6.0 |
||
redhat enterprise linux 7.0 |
||
redhat enterprise linux desktop 6.0 |
||
redhat enterprise linux desktop 7.0 |
||
redhat enterprise linux workstation 5.0 |
||
redhat enterprise linux 5.0 |
||
redhat enterprise linux workstation 6.0 |
||
redhat enterprise linux server aus 7.4 |
||
redhat enterprise linux server aus 7.3 |
||
redhat enterprise linux server eus 7.3 |
||
redhat enterprise linux server eus 7.4 |
||
redhat enterprise linux server 6.0 |
||
redhat enterprise linux server 7.0 |
||
redhat enterprise linux server 5.0 |
||
redhat enterprise linux desktop 5.0 |
||
redhat enterprise linux workstation 7.0 |
||
redhat enterprise linux server eus 7.5 |
||
mozilla thunderbird |
||
mozilla firefox |
||
mozilla firefox esr |