Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.
References
Link | Resource |
---|---|
http://www.mozilla.org/security/announce/2014/mfsa2014-25.html | Vendor Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | Third Party Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=940684 | Issue Tracking |
Configurations
History
No history.
Information
Published : 2014-03-19 10:55
Updated : 2016-11-15 17:53
NVD link : CVE-2014-1507
Mitre link : CVE-2014-1507
CVE.ORG link : CVE-2014-1507
JSON object : View
Products Affected
mozilla
- firefoxos
oracle
- solaris
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')