Mozilla Firefox before 28.0.1 on Android processes a file: URL by copying a local file onto the SD card, which allows attackers to obtain sensitive information from the Firefox profile directory via a crafted application.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.