{"id":"CVE-2023-29538","details":"Under specific circumstances a WebExtension may have received a \u003ccode\u003ejar:file:///\u003c/code\u003e URI instead of a \u003ccode\u003emoz-extension:///\u003c/code\u003e URI during a load request. This leaked directory paths on the user's machine. This vulnerability affects Firefox for Android \u003c 112, Firefox \u003c 112, and Focus for Android \u003c 112.","modified":"2026-05-04T08:44:01.405104Z","published":"2023-06-02T17:15:12.567Z","withdrawn":"2026-05-04T08:44:01.405104Z","related":["openSUSE-SU-2024:12882-1","openSUSE-SU-2024:14572-1"],"references":[{"type":"ADVISORY","url":"https://www.mozilla.org/security/advisories/mfsa2023-13/"},{"type":"REPORT","url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1685403"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-29538.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"112.0"}]},{"events":[{"introduced":"0"},{"fixed":"112.0"}]},{"events":[{"introduced":"0"},{"fixed":"112.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}]}