Files
CVEs-PoC/2017/CVE-2017-5456.md
T
2024-06-18 02:51:15 +02:00

21 lines
1.0 KiB
Markdown

### [CVE-2017-5456](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5456)
![](https://img.shields.io/static/v1?label=Product&message=Firefox%20ESR&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2052.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%2053%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Sandbox%20escape%20allowing%20local%20file%20system%20access&color=brighgreen)
### Description
A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system. This vulnerability affects Firefox ESR < 52.1 and Firefox < 53.
### POC
#### Reference
- https://bugzilla.mozilla.org/show_bug.cgi?id=1344415
- https://www.mozilla.org/security/advisories/mfsa2017-12/
#### Github
No PoCs found on GitHub currently.