CVE-2018-5181
11.06.2018, 21:29
If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.Enginsight
Vendor | Product | Version |
---|---|---|
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 17.10 |
canonical | ubuntu_linux | 18.04 |
mozilla | firefox | 𝑥 < 60.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
References