Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.
References
Link | Resource |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=940684 | Issue Tracking |
http://www.mozilla.org/security/announce/2014/mfsa2014-25.html | Vendor Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | Third Party Advisory |
Information
Published : 2014-03-19 03:55
Updated : 2016-11-15 09:53
NVD link : CVE-2014-1507
Mitre link : CVE-2014-1507
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
mozilla
- firefoxos
oracle
- solaris