The screenshot images displayed in the Activity Stream page displayed when a new tab is opened is created from the meta tags of websites. An issue was discovered where the page could attempt to create these images through "file:" URLs from the local file system. This loading is blocked by the sandbox but could expose local data if combined with another attack that escapes sandbox protections. This vulnerability affects Firefox < 58.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/102786 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040270 | Third Party Advisory VDB Entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=1420049 | Issue Tracking |
https://usn.ubuntu.com/3544-1/ | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2018-02/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2018-06-11 21:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-5118
Mitre link : CVE-2018-5118
CVE.ORG link : CVE-2018-5118
JSON object : View
Products Affected
mozilla
- firefox
canonical
- ubuntu_linux
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor