Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.
References
Link | Resource |
---|---|
http://www.mozilla.org/security/announce/2014/mfsa2014-25.html | Vendor Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | Third Party Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=940684 | Issue Tracking |
http://www.mozilla.org/security/announce/2014/mfsa2014-25.html | Vendor Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html | Third Party Advisory |
https://bugzilla.mozilla.org/show_bug.cgi?id=940684 | Issue Tracking |
Configurations
History
21 Nov 2024, 02:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.mozilla.org/security/announce/2014/mfsa2014-25.html - Vendor Advisory | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - Third Party Advisory | |
References | () https://bugzilla.mozilla.org/show_bug.cgi?id=940684 - Issue Tracking |
Information
Published : 2014-03-19 10:55
Updated : 2024-11-21 02:04
NVD link : CVE-2014-1507
Mitre link : CVE-2014-1507
CVE.ORG link : CVE-2014-1507
JSON object : View
Products Affected
oracle
- solaris
mozilla
- firefoxos
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')