CVE-2023-23597
02.06.2023, 17:15
A compromised web child process could disable web security opening restrictions, leading to a new child process being spawned within the <code>file://</code> context. Given a reliable exploit primitive, this new process could be exploited again leading to arbitrary file read. This vulnerability affects Firefox < 109.Enginsight
Vendor | Product | Version |
---|---|---|
mozilla | firefox | 𝑥 < 109.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
firefox |
| ||||||||||||||||||
mozjs38 |
| ||||||||||||||||||
mozjs52 |
| ||||||||||||||||||
mozjs68 |
| ||||||||||||||||||
mozjs78 |
| ||||||||||||||||||
mozjs91 |
| ||||||||||||||||||
thunderbird |
|
Common Weakness Enumeration