Vulnerability Name: | CVE-2018-5118 (CCN-138164) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2018-01-23 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2018-01-23 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2018-06-25 | ||||||||||||||||||||||||||||||||||||||||
Summary: | The screenshot images displayed in the Activity Stream page displayed when a new tab is opened is created from the meta tags of websites. An issue was discovered where the page could attempt to create these images through "file:" URLs from the local file system. This loading is blocked by the sandbox but could expose local data if combined with another attack that escapes sandbox protections. This vulnerability affects Firefox < 58. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) 4.6 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-200 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-5118 Source: BID Type: Third Party Advisory, VDB Entry 102786 Source: CCN Type: BID-102786 Mozilla Firefox MFSA2018-02 Multiple Security Vulnerabilities Source: SECTRACK Type: Third Party Advisory, VDB Entry 1040270 Source: CONFIRM Type: Issue Tracking https://bugzilla.mozilla.org/show_bug.cgi?id=1420049 Source: XF Type: UNKNOWN firefox-cve20185118-sec-bypass(138164) Source: UBUNTU Type: Third Party Advisory USN-3544-1 Source: CCN Type: Mozilla Foundation Security Advisory 2018-02 Security vulnerabilities fixed in Firefox 58 Source: CONFIRM Type: Vendor Advisory https://www.mozilla.org/security/advisories/mfsa2018-02/ | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: ![]() | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |