First published: Tue Apr 11 2023(Updated: )
Under specific circumstances a WebExtension may have received a <code>jar:file:///</code> URI instead of a <code>moz-extension:///</code> URI during a load request. This leaked directory paths on the user's machine. This vulnerability affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.
Credit: security@mozilla.org security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox | <112 | 112 |
All of | ||
Mozilla Firefox | =112 | |
Google Android | ||
All of | ||
Mozilla Focus | =112 | |
Google Android | ||
Mozilla Firefox | <112.0 | |
Mozilla Firefox | <112.0 | |
Mozilla Focus | <112.0 | |
ubuntu/firefox | <112.0+ | 112.0+ |
ubuntu/firefox | <112.0+ | 112.0+ |
ubuntu/firefox | <112.0-1 | 112.0-1 |
debian/firefox | 129.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2023-29538.
The severity level of CVE-2023-29538 is medium, with a severity value of 4.
CVE-2023-29538 affects Firefox for Android < 112, Firefox < 112, and Focus for Android < 112.
To fix CVE-2023-29538, update your Firefox for Android, Firefox, and Focus for Android to version 112 or later.
You can find more information about CVE-2023-29538 in the following references: [link1](https://bugzilla.mozilla.org/show_bug.cgi?id=1685403), [link2](https://www.mozilla.org/security/advisories/mfsa2023-13/), [link3](https://launchpad.net/bugs/cve/CVE-2023-29538).