CVE-2025-1936

jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*

History

24 Jun 2025, 17:08

Type Values Removed Values Added
CPE cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*
First Time Mozilla
Mozilla thunderbird
Mozilla firefox
References () https://bugzilla.mozilla.org/show_bug.cgi?id=1940027 - () https://bugzilla.mozilla.org/show_bug.cgi?id=1940027 - Permissions Required
References () https://www.mozilla.org/security/advisories/mfsa2025-14/ - () https://www.mozilla.org/security/advisories/mfsa2025-14/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2025-16/ - () https://www.mozilla.org/security/advisories/mfsa2025-16/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2025-17/ - () https://www.mozilla.org/security/advisories/mfsa2025-17/ - Vendor Advisory
References () https://www.mozilla.org/security/advisories/mfsa2025-18/ - () https://www.mozilla.org/security/advisories/mfsa2025-18/ - Vendor Advisory

26 Mar 2025, 17:15

Type Values Removed Values Added
CWE CWE-158

25 Mar 2025, 18:15

Type Values Removed Values Added
Summary
  • (es) jar: las URL recuperan el contenido de un archivo local empaquetado en un archivo ZIP. El valor null y todo lo que le sigue se ignoran al recuperar el contenido del archivo, pero la extensión falsa que sigue al valor null se utiliza para determinar el tipo de contenido. Esto podría haberse utilizado para ocultar código en una extensión web camuflada en otra cosa, como una imagen. Esta vulnerabilidad afecta a Firefox &lt; 136, Firefox ESR &lt; 128.8, Thunderbird &lt; 136 y Thunderbird &lt; 128.8.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.3

05 Mar 2025, 00:15

Type Values Removed Values Added
Summary (en) jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8. (en) jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.
References
  • () https://www.mozilla.org/security/advisories/mfsa2025-17/ -
  • () https://www.mozilla.org/security/advisories/mfsa2025-18/ -

04 Mar 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-04 14:15

Updated : 2025-06-24 17:08


NVD link : CVE-2025-1936

Mitre link : CVE-2025-1936

CVE.ORG link : CVE-2025-1936


JSON object : View

Products Affected

mozilla

  • firefox
  • thunderbird
CWE
CWE-158

Improper Neutralization of Null Byte or NUL Character