Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-1936

Опубликовано: 04 мар. 2025
Источник: debian
EPSS Низкий

Описание

jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed136.0-1package
firefox-esrfixed128.8.0esr-1package
thunderbirdfixed1:128.8.0esr-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2025-14/#CVE-2025-1936

  • https://www.mozilla.org/en-US/security/advisories/mfsa2025-16/#CVE-2025-1936

  • https://www.mozilla.org/en-US/security/advisories/mfsa2025-18/#CVE-2025-1936

EPSS

Процентиль: 32%
0.00119
Низкий

Связанные уязвимости

CVSS3: 7.3
ubuntu
4 месяца назад

jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.

CVSS3: 5.4
redhat
4 месяца назад

jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.

CVSS3: 7.3
nvd
4 месяца назад

jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.

CVSS3: 7.3
github
4 месяца назад

jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8.

CVSS3: 7.8
fstec
4 месяца назад

Уязвимость компонента RegExp браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, Thunderbird ESR, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 32%
0.00119
Низкий