{ "id": "CVE-2025-1936", "sourceIdentifier": "security@mozilla.org", "published": "2025-03-04T14:15:38.500", "lastModified": "2025-03-05T00:15:36.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8." }, { "lang": "es", "value": "jar: las URL recuperan el contenido de un archivo local empaquetado en un archivo ZIP. El valor null y todo lo que le sigue se ignoran al recuperar el contenido del archivo, pero la extensi\u00f3n falsa que sigue al valor null se utiliza para determinar el tipo de contenido. Esto podr\u00eda haberse utilizado para ocultar c\u00f3digo en una extensi\u00f3n web camuflada en otra cosa, como una imagen. Esta vulnerabilidad afecta a Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136 y Thunderbird < 128.8." } ], "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1940027", "source": "security@mozilla.org" }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-14/", "source": "security@mozilla.org" }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-16/", "source": "security@mozilla.org" }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-17/", "source": "security@mozilla.org" }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-18/", "source": "security@mozilla.org" } ] }