First published: Tue Jan 24 2017(Updated: )
The "export" function in the Certificate Viewer can force local filesystem navigation when the "common name" in a certificate contains slashes, allowing certificate content to be saved in unsafe locations with an arbitrary filename.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <51 | 51 |
Firefox | <51.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2017-5381 is considered a moderate severity vulnerability due to its potential for unauthorized file system access.
To fix CVE-2017-5381, update Mozilla Firefox to version 51.0 or later.
CVE-2017-5381 allows attackers to manipulate the export functionality to save sensitive certificate data in unsafe locations.
CVE-2017-5381 affects all versions of Mozilla Firefox prior to 51.0.
There is no official workaround for CVE-2017-5381; users are advised to update Firefox as soon as possible.