First published: Wed Mar 19 2014(Updated: )
Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris and Zettabyte File System (ZFS) | =11.3 | |
Mozilla Firefox OS | <=1.2 | |
=11.3 | ||
<=1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-1507 has been rated as a moderate severity vulnerability due to its potential to bypass media sandbox protections.
To fix CVE-2014-1507, you should update to Mozilla FirefoxOS version 1.2.2 or later, which addresses this vulnerability.
CVE-2014-1507 affects Mozilla FirefoxOS versions up to 1.2 and Oracle Solaris 11.3.
An attacker exploiting CVE-2014-1507 can read or modify arbitrary files on the device by using a crafted application.
CVE-2014-1507 exploits the DeviceStorage API by using a relative pathname, allowing unauthorized access to the file system.