CVE-2019-11730

Impact:
Moderate
Public Date:
2019-07-10
CWE:
CWE-829
Bugzilla:
1728438: CVE-2019-11730 Mozilla: Same-origin policy treats all files in a directory as having the same-origin

The MITRE CVE dictionary describes this issue as:

A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.

Find out more about CVE-2019-11730 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 6.1
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required None
User Interaction Required
Scope Changed
Confidentiality Low
Integrity Impact Low
Availability Impact None

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (thunderbird) RHSA-2019:1777 2019-07-15
Red Hat Enterprise Linux 6 (firefox) RHSA-2019:1765 2019-07-11
Red Hat Enterprise Linux 7 (thunderbird) RHSA-2019:1775 2019-07-15
Red Hat Enterprise Linux 7 (firefox) RHSA-2019:1763 2019-07-11
Red Hat Enterprise Linux 8 (thunderbird) RHSA-2019:1799 2019-07-16
Red Hat Enterprise Linux 8 (firefox) RHSA-2019:1764 2019-07-11

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 5 firefox Out of support scope
Unless explicitly stated as not affected, all previous versions of packages in any minor update stream of a product listed here should be assumed vulnerable, although may not have been subject to full analysis.

Acknowledgements

Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges Luigi Gubello as the original reporter.

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation