CVE-2018-5181

If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.
References
Link Resource
https://www.mozilla.org/security/advisories/mfsa2018-11/ Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1424107 Exploit Issue Tracking Vendor Advisory
https://usn.ubuntu.com/3645-1/ Third Party Advisory
http://www.securitytracker.com/id/1040896 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/104139 Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

Configuration 2 (hide)

cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*

Information

Published : 2018-06-11 14:29

Updated : 2018-08-03 08:49


NVD link : CVE-2018-5181

Mitre link : CVE-2018-5181


JSON object : View

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

Advertisement

dedicated server usa

Products Affected

mozilla

  • firefox

canonical

  • ubuntu_linux