CVE-2018-5181 PUBLISHED

If a URL using the "file:" protocol is dragged and dropped onto an open tab that is running in a different child process the tab will open a local file corresponding to the dropped URL, contrary to policy. One way to make the target tab open more reliably in a separate process is to open it with the "noopener" keyword. This vulnerability affects Firefox < 60.

EPSS 1.26% · 79.3th percentile

Risk Scores

EPSS Score
1.26%
79.3th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSfirefox0, 24.0+build1-0ubuntu1, 25.0+build3-0ubuntu0.13.10.1
Ubuntu:16.04:LTSfirefox0, 41.0.2+build2-0ubuntu1, 42.0+build2-0ubuntu1
Ubuntu:18.04:LTSfirefox0, 56.0+build6-0ubuntu1, 57.0.1+build2-0ubuntu1

Timeline

References

Open in Interactive Console →