First published: Tue May 05 2020(Updated: )
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <68.8 | 68.8 |
Firefox | <76 | 76 |
Firefox ESR | <68.8 | 68.8 |
Firefox | <76.0 | |
Firefox ESR | <68.8.0 | |
Thunderbird | <68.8.0 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-12393 is classified as medium severity due to the potential for command injection risks.
To fix CVE-2020-12393, users should update to the latest versions of Mozilla Firefox or Thunderbird, specifically to Firefox ESR 68.8 or Firefox 76.
The impact of CVE-2020-12393 includes the possibility of arbitrary command execution if vulnerable users paste unsafe cURL commands into a terminal.
CVE-2020-12393 affects Mozilla Firefox versions prior to 76, Firefox ESR versions prior to 68.8, and Thunderbird versions prior to 68.8.
The vendor of CVE-2020-12393 is Mozilla, the developer of Firefox and Thunderbird.