firefox is vulnerable to Path Traversal. A remote attacker is able to use the %
character in filenames to store the data outside of the intended directory using windows environment variables, such as %HOMEPATH%
or %APPDATA%
.
bugzilla.mozilla.org/show_bug.cgi?id=1765049
secdb.alpinelinux.org/edge/community.yaml
secdb.alpinelinux.org/v3.15/community.yaml
secdb.alpinelinux.org/v3.16/community.yaml
www.mozilla.org/security/advisories/mfsa2022-20/
www.mozilla.org/security/advisories/mfsa2022-21/
www.mozilla.org/security/advisories/mfsa2022-22/