Files
CVEs-PoC/2017/CVE-2017-5407.md
T
2024-06-18 02:51:15 +02:00

21 lines
1.2 KiB
Markdown

### [CVE-2017-5407](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5407)
![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2045.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2052%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Pixel%20and%20history%20stealing%20via%20floating-point%20timing%20side%20channel%20with%20SVG%20filters&color=brighgreen)
### Description
Using SVG filters that don't use the fixed point math implementation on a target iframe, a malicious page can extract pixel values from a targeted user. This can be used to extract history information and read text values across domains. This violates same-origin policy and leads to information disclosure. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
### POC
#### Reference
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336622
#### Github
No PoCs found on GitHub currently.