Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-23597

Опубликовано: 02 июн. 2023
Источник: debian
EPSS Низкий

Описание

A compromised web child process could disable web security opening restrictions, leading to a new child process being spawned within the <code>file://</code> context. Given a reliable exploit primitive, this new process could be exploited again leading to arbitrary file read. This vulnerability affects Firefox < 109.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed109.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/#CVE-2023-23597

EPSS

Процентиль: 23%
0.00075
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 2 лет назад

A compromised web child process could disable web security opening restrictions, leading to a new child process being spawned within the <code>file://</code> context. Given a reliable exploit primitive, this new process could be exploited again leading to arbitrary file read. This vulnerability affects Firefox < 109.

CVSS3: 6.5
nvd
больше 2 лет назад

A compromised web child process could disable web security opening restrictions, leading to a new child process being spawned within the <code>file://</code> context. Given a reliable exploit primitive, this new process could be exploited again leading to arbitrary file read. This vulnerability affects Firefox < 109.

CVSS3: 6.5
github
больше 2 лет назад

A compromised web child process could disable web security opening restrictions, leading to a new child process being spawned within the <code>file://</code> context. Given a reliable exploit primitive, this new process could be exploited again leading to arbitrary file read. This vulnerability affects Firefox < 109.

CVSS3: 7.5
fstec
почти 3 года назад

Уязвимость браузера Mozilla Firefox, связанная с ошибками в настройках безопасности, позволяющая нарушителю читать произвольные файлы

EPSS

Процентиль: 23%
0.00075
Низкий