Files with the .JNLP extension used for "Java web start" applications are not treated as executable content for download prompts even though they can be executed if Java is installed on the local system. This could allow users to mistakenly launch an executable binary locally. This vulnerability affects Firefox < 67.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2019-13/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1392955 | issue tracking exploit vendor advisory |