Vulnerability Description
Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via a crafted application that uses a relative pathname for a DeviceStorageFile object.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oracle | Solaris | 11.3 |
| Mozilla | Firefoxos | <= 1.2 |
Related Weaknesses (CWE)
References
- http://www.mozilla.org/security/announce/2014/mfsa2014-25.htmlVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlThird Party Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=940684Issue Tracking
- http://www.mozilla.org/security/announce/2014/mfsa2014-25.htmlVendor Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlThird Party Advisory
- https://bugzilla.mozilla.org/show_bug.cgi?id=940684Issue Tracking
FAQ
What is CVE-2014-1507?
CVE-2014-1507 is a vulnerability with a CVSS score of 9.3 (HIGH). Directory traversal vulnerability in the DeviceStorage API in Mozilla FirefoxOS before 1.2.2 allows attackers to bypass the media sandbox protection mechanism, and read or modify arbitrary files, via ...
How severe is CVE-2014-1507?
CVE-2014-1507 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-1507?
Check the references section above for vendor advisories and patch information. Affected products include: Oracle Solaris, Mozilla Firefoxos.