cve/2023/CVE-2023-23599.md

21 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-23599](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23599)
![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%20102.7%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%20109%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Malicious%20command%20could%20be%20hidden%20in%20devtools%20output%20on%20Windows&color=brighgreen)
### Description
When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
### POC
#### Reference
- https://bugzilla.mozilla.org/show_bug.cgi?id=1777800
#### Github
No PoCs found on GitHub currently.