If a text string that happens to be a filename in the operating system's native format is dragged and dropped onto the addressbar the specified local file will be opened. This is contrary to policy and is what would happen if the string were the equivalent "file:" URL. This vulnerability affects Firefox < 60.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104139 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040896 | Third Party Advisory VDB Entry |
https://bugzilla.mozilla.org/show_bug.cgi?id=1435908 | Issue Tracking Permissions Required Vendor Advisory |
https://usn.ubuntu.com/3645-1/ | Third Party Advisory |
https://www.mozilla.org/security/advisories/mfsa2018-11/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2018-06-11 21:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-5182
Mitre link : CVE-2018-5182
CVE.ORG link : CVE-2018-5182
JSON object : View
Products Affected
mozilla
- firefox
canonical
- ubuntu_linux
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor