First published: Wed Mar 19 2014(Updated: )
Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris | =11.3 | |
Mozilla FirefoxOS | <=1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.