Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-23598

Опубликовано: 02 июн. 2023
Источник: debian
EPSS Низкий

Описание

Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to <code>DataTransfer.setData</code>. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed109.0-1package
firefox-esrfixed102.7.0esr-1package
thunderbirdfixed1:102.7.1-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2023-01/#CVE-2023-23598

  • https://www.mozilla.org/en-US/security/advisories/mfsa2023-02/#CVE-2023-23598

  • https://www.mozilla.org/en-US/security/advisories/mfsa2023-03/#CVE-2023-23598

EPSS

Процентиль: 35%
0.00137
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 2 лет назад

Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to <code>DataTransfer.setData</code>. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.

CVSS3: 7.5
redhat
больше 2 лет назад

Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to <code>DataTransfer.setData</code>. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.

CVSS3: 6.5
nvd
около 2 лет назад

Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to <code>DataTransfer.setData</code>. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.

CVSS3: 6.5
github
около 2 лет назад

Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to <code>DataTransfer.setData</code>. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.

CVSS3: 7.5
fstec
больше 2 лет назад

Уязвимость браузеров Mozilla Firefox и Firefox ESR, связанная с ошибками при интерпретации данных, загруженных несколькими способами, позволяющая нарушителю читать произвольные файлы

EPSS

Процентиль: 35%
0.00137
Низкий