First published: Tue Jul 09 2019(Updated: )
A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. Luigi Gubello demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <68 | 68 |
<68 | 68 | |
<60.8 | 60.8 | |
<60.8 | 60.8 | |
Mozilla Firefox | <68.0 | |
Mozilla Firefox ESR | <60.8 | |
Mozilla Thunderbird | <60.8 | |
Debian Debian Linux | =8.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Suse Package Hub | ||
SUSE Linux Enterprise | =12.0 | |
<68 | 68 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2019-11730 is a vulnerability that allows locally saved HTML files to access other files in the same directory or sub-directories.
Mozilla Thunderbird versions up to 60.8, Mozilla Thunderbird versions up to 68, Mozilla Firefox versions up to 68, Mozilla Firefox ESR versions up to 60.8, and Debian Linux, openSUSE Leap, Suse Package Hub are affected by CVE-2019-11730.
To exploit CVE-2019-11730, an attacker would need to trick a user into opening a locally saved HTML file.
CVE-2019-11730 has a severity rating of medium (6.5).
To mitigate CVE-2019-11730, update to Mozilla Thunderbird 60.8 or later, Mozilla Thunderbird 68 or later, or Mozilla Firefox 68 or later.