Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-5181

Опубликовано: 11 июн. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.

РелизСтатусПримечание
artful

released

60.0+build2-0ubuntu0.17.10.1
bionic

released

60.0+build2-0ubuntu1
devel

released

60.0+build2-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [60.0+build2-0ubuntu0.14.04.1]]
precise/esm

DNE

trusty

released

60.0+build2-0ubuntu0.14.04.1
trusty/esm

DNE

trusty was released [60.0+build2-0ubuntu0.14.04.1]
upstream

released

60.0
xenial

released

60.0+build2-0ubuntu0.16.04.1

Показывать по

EPSS

Процентиль: 79%
0.01262
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
больше 7 лет назад

If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.

CVSS3: 7.5
nvd
больше 7 лет назад

If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.

CVSS3: 7.5
debian
больше 7 лет назад

If a URL using the "file:" protocol is dragged and dropped onto an ope ...

CVSS3: 7.5
github
больше 3 лет назад

If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.

CVSS3: 6.5
fstec
больше 7 лет назад

Уязвимость браузера Firefox, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить конфиденциальную информацию

EPSS

Процентиль: 79%
0.01262
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Уязвимость CVE-2018-5181