Mozilla Foundation Security Advisory 2008-05
Directory traversal via chrome: URI
- February 7, 2008
- Gerry Eisenhaur
- Firefox, SeaMonkey, Thunderbird
- Fixed in
- Firefox 188.8.131.52
- SeaMonkey 1.1.8
- Thunderbird 184.108.40.206
Mozilla researcher moz_bug_r_a4 reported that this
vulnerability could be used to steal the contents of the browser's
sessionstore.js file, which contains session cookie data
and information about currently open web pages.
Disable "flat-packaged" add-ons until a version containing these fixes can be installed.