A vulnerability exists where if a user opens a locally saved HTML file, this file can use `file:` URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. Luigi Gubello demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. External Reference: https://www.mozilla.org/en-US/security/advisories/mfsa2019-22/#CVE-2019-11730
Acknowledgments: Name: the Mozilla project Upstream: Luigi Gubello
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:1764 https://access.redhat.com/errata/RHSA-2019:1764
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:1765 https://access.redhat.com/errata/RHSA-2019:1765
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1763 https://access.redhat.com/errata/RHSA-2019:1763
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-11730
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:1775 https://access.redhat.com/errata/RHSA-2019:1775
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:1777 https://access.redhat.com/errata/RHSA-2019:1777
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2019:1799 https://access.redhat.com/errata/RHSA-2019:1799