Mozilla Foundation Security Advisory 2013-75

Local Java applets may read contents of local file system

Announced
August 6, 2013
Reporter
Georgi Guninski, John Schoenick
Impact
High
Products
Firefox, Firefox ESR, SeaMonkey, Thunderbird, Thunderbird ESR
Fixed in
  • Firefox 23
  • Firefox ESR 17.0.8
  • SeaMonkey 2.20
  • Thunderbird 17.0.8
  • Thunderbird ESR 17.0.8

Description

Security researcher Georgi Guninski reported an issue with Java applets where in some circumstances the applet could access files on the local system when loaded using the a file:/// URI and violate file origin policy due to interaction with the codebase parameter. This affects applets running on the local file system. Mozilla developer John Schoenick later discovered that fixes for this issue were inadequate and allowed the invocation of Java applets to bypass security checks in additional circumstances. This could lead to untrusted Java applets having read-only access on the local files system if used in conjunction with a method to download a file to a known or guessable path.

In general these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled, but are potentially a risk in browser or browser-like contexts.

References