Vulnerability Description
Mozilla Firefox before 21.0 does not properly implement the INPUT element, which allows remote attackers to obtain the full pathname via a crafted web site.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mozilla | Firefox | <= 20.0.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-43.htmlVendor Advisory
- http://www.ubuntu.com/usn/USN-1822-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=842255
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-43.htmlVendor Advisory
- http://www.ubuntu.com/usn/USN-1822-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=842255
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2013-1671?
CVE-2013-1671 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Mozilla Firefox before 21.0 does not properly implement the INPUT element, which allows remote attackers to obtain the full pathname via a crafted web site.
How severe is CVE-2013-1671?
CVE-2013-1671 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-1671?
Check the references section above for vendor advisories and patch information. Affected products include: Mozilla Firefox.