First published: Tue Jan 17 2023(Updated: )
When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <102.7 | 102.7 |
<109 | 109 | |
<102.7 | 102.7 | |
<102.7 | 102.7 | |
Mozilla Firefox | <109.0 | |
Mozilla Firefox ESR | <102.7 | |
Mozilla Thunderbird | <102.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-23599 is a vulnerability in Firefox, Thunderbird, and Firefox ESR that allows arbitrary commands to be hidden within network requests when copying them as curl commands.
Firefox versions earlier than 109, Thunderbird versions earlier than 102.7, and Firefox ESR versions earlier than 102.7 are affected by CVE-2023-23599.
CVE-2023-23599 has a severity rating of 6.5, which is considered medium.
To fix CVE-2023-23599, update to Firefox version 109 or later, Thunderbird version 102.7 or later, or Firefox ESR version 102.7 or later.
You can find more information about CVE-2023-23599 on the Mozilla security advisories page.