| Vulnerability Name: | CVE-2018-5107 (CCN-138152) | ||||||||||||||||||||||||||||||||||||||||
| Assigned: | 2018-01-23 | ||||||||||||||||||||||||||||||||||||||||
| Published: | 2018-01-23 | ||||||||||||||||||||||||||||||||||||||||
| Updated: | 2018-06-25 | ||||||||||||||||||||||||||||||||||||||||
| Summary: | The printing process can bypass local access protections to read files available through symlinks, bypassing local file restrictions. The printing process requires files in a specific format so arbitrary data cannot be read but it is possible that some local file information could be exposed. This vulnerability affects Firefox < 58. | ||||||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
3.5 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-59 | ||||||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | File Manipulation | ||||||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-5107 Source: BID Type: Third Party Advisory, VDB Entry 102786 Source: CCN Type: BID-102786 Mozilla Firefox MFSA2018-02 Multiple Security Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1040270 Source: CONFIRM Type: Issue Tracking, Permissions Required https://bugzilla.mozilla.org/show_bug.cgi?id=1379276 Source: XF Type: UNKNOWN firefox-cve20185107-symlink(138152) Source: UBUNTU Type: Third Party Advisory USN-3544-1 Source: CCN Type: Mozilla Foundation Security Advisory 2018-02 Security vulnerabilities fixed in Firefox 58 Source: CONFIRM Type: Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-02/ | ||||||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||||||