First published: Tue May 05 2020(Updated: )
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <68.8 | 68.8 |
Mozilla Firefox | <76 | 76 |
Mozilla Thunderbird | <68.8 | 68.8 |
Mozilla Firefox | <76.0 | |
Mozilla Firefox ESR | <68.8.0 | |
Mozilla Thunderbird | <68.8.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)