The code for downloading files did not properly take care of special characters, which led to an attacker being able to cut off the file ending at an earlier position, leading to a different file type being downloaded than shown in the dialog. This vulnerability affects Firefox ESR < 78.1, Firefox < 79, and Thunderbird < 78.1.
The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur frequently during day to day operation of the product.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2020-30/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2020-32/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2020-33/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1637745 | vendor advisory issue tracking permissions required |
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00025.html | third party advisory vendor advisory |
https://usn.ubuntu.com/4443-1/ | third party advisory vendor advisory |