Files
CVEs-PoC/2017/CVE-2017-5425.md
T
2025-09-29 21:09:30 +02:00

19 lines
1.1 KiB
Markdown

### [CVE-2017-5425](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5425)
![](https://img.shields.io/static/v1?label=Product&message=Firefox&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Thunderbird&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Overly%20permissive%20Gecko%20Media%20Plugin%20sandbox%20regular%20expression%20access&color=brightgreen)
### Description
The Gecko Media Plugin sandbox allows access to local files that match specific regular expressions. On OS OX, this matching allows access to some data in subdirectories of "/private/var" that could expose personal or temporary data. This has been updated to not allow access to "/private/var" and its subdirectories. Note: this issue only affects OS X. Other operating systems are not affected. This vulnerability affects Firefox < 52 and Thunderbird < 52.
### POC
#### Reference
- https://www.mozilla.org/security/advisories/mfsa2017-05/
#### Github
No PoCs found on GitHub currently.