The existence of a specifically requested local file can be found due to the double firing of the "onerror" when the "source" attribute on a "<track>" tag refers to a file that does not exist if the source page is loaded locally. This vulnerability affects Firefox < 51.
The product places sensitive information into files or directories that are accessible to actors who are allowed to have access to the files, but not to the sensitive information.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1037693 | vdb entry third party advisory |
https://www.mozilla.org/security/advisories/mfsa2017-01/ | vendor advisory |
http://www.securityfocus.com/bid/95763 | vdb entry third party advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1295023 | issue tracking exploit |