Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-1936

Опубликовано: 04 мар. 2025
Источник: redhat
CVSS3: 5.4

Описание

jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.

Отчет

Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10firefoxAffected
Red Hat Enterprise Linux 10firefox-flatpak-containerAffected
Red Hat Enterprise Linux 6firefoxOut of support scope
Red Hat Enterprise Linux 9firefox-flatpak-containerAffected
Red Hat Enterprise Linux 7 Extended Lifecycle SupportfirefoxFixedRHSA-2025:269913.03.2025
Red Hat Enterprise Linux 8firefoxFixedRHSA-2025:245206.03.2025
Red Hat Enterprise Linux 8.2 Advanced Update SupportfirefoxFixedRHSA-2025:270813.03.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportfirefoxFixedRHSA-2025:248410.03.2025
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicefirefoxFixedRHSA-2025:248410.03.2025
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsfirefoxFixedRHSA-2025:248410.03.2025

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-754
https://bugzilla.redhat.com/show_bug.cgi?id=2349797firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents

5.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.3
ubuntu
4 месяца назад

jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.

CVSS3: 7.3
nvd
4 месяца назад

jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.

CVSS3: 7.3
debian
4 месяца назад

jar: URLs retrieve local file content packaged in a ZIP archive. The n ...

CVSS3: 7.3
github
4 месяца назад

jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8.

CVSS3: 7.8
fstec
4 месяца назад

Уязвимость компонента RegExp браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, Thunderbird ESR, позволяющая нарушителю выполнить произвольный код

5.4 Medium

CVSS3