cve/2017/CVE-2017-5456.md

21 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-5456](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5456)
![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2052.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2053%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Sandbox%20escape%20allowing%20local%20file%20system%20access&color=brighgreen)
### Description
A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system. This vulnerability affects Firefox ESR < 52.1 and Firefox < 53.
### POC
#### Reference
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344415
- https://www.mozilla.org/security/advisories/mfsa2017-12/
#### Github
No PoCs found on GitHub currently.