CVE Vulnerabilities

CVE-2020-35112

Published: Jan 07, 2021 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.8 LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

If a user downloaded a file lacking an extension on Windows, and then Open-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead. Note: This issue only affected Windows operating systems. Other operating systems are unaffected.. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.

Affected Software

NameVendorStart VersionEnd Version
FirefoxMozilla*84.0 (excluding)
Firefox_esrMozilla*78.6.0 (excluding)
ThunderbirdMozilla*78.6.0 (excluding)
FirefoxUbuntutrusty*
FirefoxUbuntuupstream*
Mozjs38Ubuntubionic*
Mozjs38Ubuntuesm-apps/bionic*
Mozjs38Ubuntuupstream*
Mozjs52Ubuntubionic*
Mozjs52Ubuntuesm-apps/focal*
Mozjs52Ubuntuesm-infra/bionic*
Mozjs52Ubuntufocal*
Mozjs52Ubuntugroovy*
Mozjs52Ubuntuupstream*
Mozjs60Ubuntuupstream*
Mozjs68Ubuntuesm-infra/focal*
Mozjs68Ubuntufocal*
Mozjs68Ubuntugroovy*
Mozjs68Ubuntuupstream*
Mozjs78Ubuntuesm-apps/jammy*
Mozjs78Ubuntugroovy*
Mozjs78Ubuntuhirsute*
Mozjs78Ubuntuimpish*
Mozjs78Ubuntujammy*
Mozjs78Ubuntukinetic*
Mozjs78Ubuntulunar*
Mozjs78Ubuntuupstream*
ThunderbirdUbuntutrusty*
ThunderbirdUbuntuupstream*

References