Mozilla security researcher moz_bug_r_a4 reported a mechanism to exploit the <input> control when set to the file type in order to get the full path. This can lead to information leakage and could be combined with other exploits to target attacks on the local file system. External Reference: http://www.mozilla.org/security/announce/2013/mfsa2013-43.html Acknowledgements: Red Hat would like to thank the Mozilla project for reporting this issue. Upstream acknowledges moz_bug_r_a4 as the original reporter. Statement: This issue does not affect the version of firefox and thunderbird as shipped with Red Hat Enterprise Linux 5 and 6