The screenshot images displayed in the Activity Stream page displayed when a new tab is opened is created from the meta tags of websites. An issue was discovered where the page could attempt to create these images through "file:" URLs from the local file system. This loading is blocked by the sandbox but could expose local data if combined with another attack that escapes sandbox protections. This vulnerability affects Firefox < 58.
References
Link | Resource |
---|---|
https://www.mozilla.org/security/advisories/mfsa2018-02/ | Vendor Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=1420049 | Issue Tracking |
https://usn.ubuntu.com/3544-1/ | Third Party Advisory |
http://www.securitytracker.com/id/1040270 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/102786 | Third Party Advisory VDB Entry |
Information
Published : 2018-06-11 14:29
Updated : 2018-06-25 10:25
NVD link : CVE-2018-5118
Mitre link : CVE-2018-5118
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
mozilla
- firefox
canonical
- ubuntu_linux