When downloading files on Windows, the % character was not escaped, which could have lead to a download incorrectly being saved to attacker-influenced paths that used variables such as %HOMEPATH% or %APPDATA%.<br>*This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
The product allows user input to control or influence paths or file names that are used in filesystem operations.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2022-20/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-22/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2022-21/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1765049 | issue tracking permissions required vendor advisory |