After downloading a Windows <code>.url</code> shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource.<br>*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Link | Tags |
---|---|
https://www.mozilla.org/security/advisories/mfsa2023-06/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2023-05/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2023-07/ | vendor advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1809923 | issue tracking permissions required |
https://bugzilla.mozilla.org/show_bug.cgi?id=1784451 | vendor advisory issue tracking exploit |
https://bugzilla.mozilla.org/show_bug.cgi?id=1810143 | issue tracking permissions required |
https://bugzilla.mozilla.org/show_bug.cgi?id=1812338 | issue tracking permissions required |