If a text string that happens to be a filename in the operating system's native format is dragged and dropped onto the addressbar the specified local file will be opened. This is contrary to policy and is what would happen if the string were the equivalent "file:" URL. This vulnerability affects Firefox < 60.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2018-11/ | vendor advisory |
http://www.securitytracker.com/id/1040896 | vdb entry third party advisory |
https://usn.ubuntu.com/3645-1/ | third party advisory vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1435908 | issue tracking permissions required vendor advisory |
http://www.securityfocus.com/bid/104139 | vdb entry third party advisory |