← Back to CVEs
CVE-2017-5384
N/ADescription
Proxy Auto-Config (PAC) files can specify a JavaScript function called for all URL requests with the full URL path which exposes more information than would be sent to the proxy itself in the case of HTTPS. Normally the Proxy Auto-Config file is specified by the user or machine owner and presumed to be non-malicious, but if a user has enabled Web Proxy Auto Detect (WPAD) this file can be served remotely. This vulnerability affects Firefox < 51.
CVE Details
CVSS v3.1 ScoreN/A
Published6/11/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
mozilla:firefox
Weaknesses (CWE)
CWE-200
References
http://www.securityfocus.com/bid/95763(security@mozilla.org)
http://www.securitytracker.com/id/1037693(security@mozilla.org)
https://bugzilla.mozilla.org/show_bug.cgi?id=1255474(security@mozilla.org)
https://www.contextis.com//resources/blog/leaking-https-urls-20-year-old-vulnerability/(security@mozilla.org)
https://www.mozilla.org/security/advisories/mfsa2017-01/(security@mozilla.org)
http://www.securityfocus.com/bid/95763(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1037693(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.mozilla.org/show_bug.cgi?id=1255474(af854a3a-2127-422b-91ae-364da2661108)
https://www.contextis.com//resources/blog/leaking-https-urls-20-year-old-vulnerability/(af854a3a-2127-422b-91ae-364da2661108)
https://www.mozilla.org/security/advisories/mfsa2017-01/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.