File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1118-1 | firefox-esr security update |
![]() |
DLA-1153-1 | icedove/thunderbird security update |
![]() |
DSA-3987-1 | firefox-esr security update |
![]() |
DSA-4014-1 | thunderbird security update |
![]() |
EUVD-2017-16789 | File downloads encoded with "blob:" and "data:" URL elements bypassed normal file download checks though the Phishing and Malware Protection feature and its block lists of suspicious sites and files. This would allow malicious sites to lure users into downloading executables that would otherwise be detected as suspicious. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4. |
![]() |
USN-3435-1 | Firefox vulnerabilities |
![]() |
USN-3436-1 | Thunderbird vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2024-08-05T16:12:28.371Z
Reserved: 2017-04-12T00:00:00
Link: CVE-2017-7814

No data.

Status : Modified
Published: 2018-06-11T21:29:10.547
Modified: 2024-11-21T03:32:43.190
Link: CVE-2017-7814


No data.