Lucene search

K
mozillaMozilla FoundationMFSA2014-25
HistoryMar 18, 2014 - 12:00 a.m.

Firefox OS DeviceStorageFile object vulnerable to relative path escape — Mozilla

2014-03-1800:00:00
Mozilla Foundation
www.mozilla.org
24

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

72.1%

Mozlla developer Ben Turner discovered that the protection against Directory Traversal through the DeviceStorage API was implemented in the wrong process on Firefox OS. If a Firefox OS application with any device-storage permissions were compromised an attacker could escape the media sandbox and potentially read or write any file on the device, depending on the permission level of the application

Affected configurations

Vulners
Node
mozillafirefox_osRange<1.2.2
OR
mozillafirefox_osRange<1.3
CPENameOperatorVersion
firefox oslt1.2.2
firefox oslt1.3

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.004 Low

EPSS

Percentile

72.1%