Description Preview
Overview
This vulnerability (CWE-668: Exposure of Resource to Wrong Sphere) occurs in Mozilla Firefox's WebExtension handling mechanism. Under certain conditions, the browser incorrectly provides WebExtensions with jar:file:/// URIs that contain local file system paths instead of properly sandboxed moz-extension:/// URIs. This information disclosure vulnerability could allow extensions to gain knowledge of the user's directory structure, which should normally be restricted. The issue affects Firefox, Firefox for Android, and Focus for Android versions before 112, potentially compromising user privacy by exposing file system information that should remain inaccessible to extensions.
Remediation
Users should update to Firefox version 112 or later, Firefox for Android version 112 or later, or Focus for Android version 112 or later. Mozilla has fixed the vulnerability in these versions by ensuring WebExtensions consistently receive the appropriate moz-extension:/// URIs instead of jar:file:/// URIs. System administrators should ensure that all Firefox installations in their environment are updated to the patched versions to mitigate this vulnerability.
References
- Mozilla Foundation Security Advisory (MFSA2023-13): https://www.mozilla.org/security/advisories/mfsa2023-13/
- Mozilla Bugzilla Issue Tracking: https://bugzilla.mozilla.org/show_bug.cgi?id=1685403
- CWE-668: Exposure of Resource to Wrong Sphere: https://cwe.mitre.org/data/definitions/668.html
Industry ExposureMost to leastThis section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.
- Health Care & Social AssistanceHealth Care & Social Assistance
- ManufacturingManufacturing
- Public AdministrationPublic Administration
- Educational ServicesEducational Services
- Finance and InsuranceFinance and Insurance
- Transportation & WarehousingTransportation & Warehousing
- UtilitiesUtilities
- Retail TradeRetail Trade
- Professional, Scientific, & Technical ServicesProfessional, Scientific, & Technical Services
- Other Services (except Public Administration)Other Services (except Public Administration)
- Arts, Entertainment & RecreationArts, Entertainment & Recreation
- InformationInformation
- Management of Companies & EnterprisesManagement of Companies & Enterprises
- Agriculture, Forestry Fishing & HuntingAgriculture, Forestry Fishing & Hunting
- MiningMining
- Real Estate Rental & LeasingReal Estate Rental & Leasing
- ConstructionConstruction
- Accommodation & Food ServicesAccommodation & Food Services
- Administrative, Support, Waste Management & Remediation ServicesAdministrative, Support, Waste Management & Remediation Services
- Wholesale TradeWholesale Trade