Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to `DataTransfer.setData`. This vulnerability affects Firefox < 109, Firefox ESR < 102.7, and Thunderbird < 102.7.
Metrics
Affected Vendors & Products
References
History
Thu, 18 Dec 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to <code>DataTransfer.setData</code>. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7. | Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to `DataTransfer.setData`. This vulnerability affects Firefox < 109, Firefox ESR < 102.7, and Thunderbird < 102.7. |
| Title | Mozilla: Arbitrary file read from GTK drag and drop on Linux | Arbitrary file read from GTK drag and drop on Linux |
Thu, 09 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mozilla
Published: 2023-06-02T00:00:00
Updated: 2025-12-18T15:22:51.666Z
Reserved: 2023-01-16T00:00:00
Link: CVE-2023-23598
Updated: 2024-08-02T10:35:33.595Z
Status : Modified
Published: 2023-06-02T17:15:10.580
Modified: 2025-12-18T16:15:48.307
Link: CVE-2023-23598