Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-27697 | A compromised web child process could disable web security opening restrictions, leading to a new child process being spawned within the <code>file://</code> context. Given a reliable exploit primitive, this new process could be exploited again leading to arbitrary file read. This vulnerability affects Firefox < 109. |
Ubuntu USN |
USN-5816-1 | Firefox vulnerabilities |
Thu, 18 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A compromised web child process could disable web security opening restrictions, leading to a new child process being spawned within the <code>file://</code> context. Given a reliable exploit primitive, this new process could be exploited again leading to arbitrary file read. This vulnerability affects Firefox < 109. | A compromised web child process could disable web security opening restrictions, leading to a new child process being spawned within the `file://` context. Given a reliable exploit primitive, this new process could be exploited again leading to arbitrary file read. This vulnerability affects Firefox < 109. |
| Title | Logic bug in process allocation allowed to read arbitrary files |
Thu, 09 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2025-12-18T15:23:23.531Z
Reserved: 2023-01-16T00:00:00.000Z
Link: CVE-2023-23597
Updated: 2024-08-02T10:35:33.591Z
Status : Modified
Published: 2023-06-02T17:15:10.537
Modified: 2025-12-18T16:15:48.180
Link: CVE-2023-23597
No data.
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN