Description
If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.
Published: 2018-06-11
Score: 7.5 High
EPSS: 1.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-16966 If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.
Ubuntu USN Ubuntu USN USN-3645-1 Firefox vulnerabilities
History

No history.

Subscriptions

Canonical Ubuntu Linux
Mozilla Firefox
cve-icon MITRE

Status: PUBLISHED

Assigner: mozilla

Published:

Updated: 2024-08-05T05:26:47.013Z

Reserved: 2018-01-03T00:00:00.000Z

Link: CVE-2018-5181

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-11T21:29:16.297

Modified: 2024-11-21T04:08:17.120

Link: CVE-2018-5181

cve-icon Redhat

Severity : Low

Publid Date: 2018-05-09T00:00:00Z

Links: CVE-2018-5181 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses