### [CVE-2023-29541](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29541) ![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Firefox%20for%20Android&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Focus%20for%20Android&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%20102.10%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=%3C%20112%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Files%20with%20malicious%20extensions%20could%20have%20been%20downloaded%20unsafely%20on%20Linux&color=brighgreen) ### Description Firefox did not properly handle downloads of files ending in .desktop, which can be interpreted to run attacker-controlled commands.
*This bug only affects Firefox for Linux on certain Distributions. Other operating systems are unaffected, and Mozilla is unable to enumerate all affected Linux Distributions.*. This vulnerability affects Firefox < 112, Focus for Android < 112, Firefox ESR < 102.10, Firefox for Android < 112, and Thunderbird < 102.10. ### POC #### Reference - https://bugzilla.mozilla.org/show_bug.cgi?id=1810191 #### Github No PoCs found on GitHub currently.