Vulnerability CVE-2018-5182: Information

Description

If a text string that happens to be a filename in the operating system's native format is dragged and dropped onto the addressbar the specified local file will be opened. This is contrary to policy and is what would happen if the string were the equivalent "file:" URL. This vulnerability affects Firefox < 60.

Severity: HIGH (7.5) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Published: June 12, 2018
Modified: Aug. 3, 2018
Error type identifier: CWE-200

Fixed packages

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://www.mozilla.org/security/advisories/mfsa2018-11/
  • Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1435908
  • Issue Tracking
  • Permissions Required
  • Vendor Advisory
USN-3645-1
  • Third Party Advisory
1040896
  • Third Party Advisory
  • VDB Entry
104139
  • Third Party Advisory
  • VDB Entry
    1. Configuration 1

      cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

      cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

      Configuration 2

      cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
      End excliding
      60.0