CVE-2014-1507

Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.
Configurations

Configuration 1 (hide)

cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:mozilla:firefoxos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:04

Type Values Removed Values Added
References () http://www.mozilla.org/security/announce/2014/mfsa2014-25.html - Vendor Advisory () http://www.mozilla.org/security/announce/2014/mfsa2014-25.html - Vendor Advisory
References () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - Third Party Advisory () http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - Third Party Advisory
References () https://bugzilla.mozilla.org/show_bug.cgi?id=940684 - Issue Tracking () https://bugzilla.mozilla.org/show_bug.cgi?id=940684 - Issue Tracking

Information

Published : 2014-03-19 10:55

Updated : 2024-11-21 02:04


NVD link : CVE-2014-1507

Mitre link : CVE-2014-1507

CVE.ORG link : CVE-2014-1507


JSON object : View

Products Affected

oracle

  • solaris

mozilla

  • firefoxos
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')