Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-23598

Опубликовано: 17 янв. 2023
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to DataTransfer.setData. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.

The Mozilla Foundation Security Advisory describes this flaw as: Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to DataTransfer.setData.

Отчет

Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6firefoxOut of support scope
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7firefoxFixedRHSA-2023:029623.01.2023
Red Hat Enterprise Linux 7thunderbirdFixedRHSA-2023:045625.01.2023
Red Hat Enterprise Linux 8firefoxFixedRHSA-2023:028823.01.2023
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2023:046325.01.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsfirefoxFixedRHSA-2023:029023.01.2023
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsthunderbirdFixedRHSA-2023:045725.01.2023
Red Hat Enterprise Linux 8.2 Advanced Update SupportfirefoxFixedRHSA-2023:029423.01.2023
Red Hat Enterprise Linux 8.2 Advanced Update SupportthunderbirdFixedRHSA-2023:045925.01.2023

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-450
https://bugzilla.redhat.com/show_bug.cgi?id=2162338Mozilla: Arbitrary file read from GTK drag and drop on Linux

EPSS

Процентиль: 35%
0.00137
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 2 лет назад

Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to <code>DataTransfer.setData</code>. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.

CVSS3: 6.5
nvd
около 2 лет назад

Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to <code>DataTransfer.setData</code>. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.

CVSS3: 6.5
debian
около 2 лет назад

Due to the Firefox GTK wrapper code's use of text/plain for drag data ...

CVSS3: 6.5
github
около 2 лет назад

Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to <code>DataTransfer.setData</code>. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.

CVSS3: 7.5
fstec
больше 2 лет назад

Уязвимость браузеров Mozilla Firefox и Firefox ESR, связанная с ошибками при интерпретации данных, загруженных несколькими способами, позволяющая нарушителю читать произвольные файлы

EPSS

Процентиль: 35%
0.00137
Низкий

7.5 High

CVSS3