Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5692: Bypass of file name restrictions during saving in Mozilla Firefox

0
Medium
VulnerabilityCVE-2024-5692cvecve-2024-5692
Published: Tue Jun 11 2024 (06/11/2024, 12:40:13 UTC)
Source: CVE Database V5
Vendor/Project: Mozilla
Product: Firefox

Description

On Windows 10, when using the 'Save As' functionality, an attacker could have tricked the browser into saving the file with a disallowed extension such as `.url` by including an invalid character in the extension. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox < 127, Firefox ESR < 115.12, and Thunderbird < 115.12.

AI-Powered Analysis

AILast updated: 02/26/2026, 22:27:32 UTC

Technical Analysis

CVE-2024-5692 is a vulnerability identified in Mozilla Firefox and Thunderbird on Windows 10 platforms, specifically affecting versions of Firefox prior to 127 and Thunderbird prior to 115.12. The issue arises from improper validation of file extensions during the 'Save As' operation. Normally, browsers enforce restrictions on saving files with certain extensions to prevent security risks, such as saving executable or shortcut files that could be used maliciously. However, this vulnerability allows an attacker to bypass these restrictions by embedding invalid characters within the file extension, causing the browser to misinterpret the extension and save the file with a disallowed extension like '.url'. This can be exploited by crafting web content that, when a user initiates a save operation, results in saving files that could be used for phishing or to execute malicious payloads. The vulnerability is limited to Windows operating systems due to how file extensions and saving mechanisms are handled there. Exploitation requires user interaction, specifically the user initiating a 'Save As' dialog, but does not require any privileges or authentication. The CVSS v3.1 base score is 6.5 (medium severity), reflecting a network attack vector with low complexity, no privileges required, but requiring user interaction and impacting integrity without affecting confidentiality or availability. No known exploits have been reported in the wild at this time. The issue has been publicly disclosed and patches are expected or available in Firefox 127 and Thunderbird 115.12 and later versions.

Potential Impact

The primary impact of this vulnerability is the potential for attackers to bypass file extension restrictions during file saving, which can lead to several security risks. By saving files with disallowed extensions such as '.url' or other potentially dangerous types, attackers can facilitate phishing attacks, social engineering, or delivery of malicious payloads that might be executed by the user or the system. This undermines the browser's security controls designed to prevent inadvertent saving of harmful files. While the vulnerability does not directly compromise confidentiality or availability, it threatens the integrity of the user's system by enabling the introduction of malicious files. Organizations relying on Firefox or Thunderbird on Windows 10 could see increased risk of targeted attacks leveraging this flaw, especially in environments where users frequently download or save files from untrusted sources. The requirement for user interaction limits automated exploitation but does not eliminate risk, particularly in spear-phishing or drive-by download scenarios. Since the vulnerability is Windows-specific, organizations with a large Windows user base are more exposed. The absence of known exploits in the wild reduces immediate risk but patching is critical to prevent future exploitation.

Mitigation Recommendations

To mitigate this vulnerability, organizations and users should promptly update Mozilla Firefox to version 127 or later and Thunderbird to version 115.12 or later, where the issue has been addressed. Until updates are applied, users should exercise caution when saving files from untrusted or unknown sources, especially when the 'Save As' dialog is triggered. Security teams should consider deploying endpoint protection solutions that can detect and block suspicious file types or extensions, particularly those that might be saved through this bypass. Implementing strict application whitelisting and restricting execution of files with uncommon or potentially dangerous extensions can reduce the impact of any malicious files saved via this vulnerability. User education on the risks of saving files from untrusted websites and recognizing phishing attempts is also important. Monitoring for unusual file creation events with disallowed extensions on Windows endpoints can help detect exploitation attempts. Finally, organizations should maintain up-to-date inventories of affected software versions to ensure timely patch management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mozilla
Date Reserved
2024-06-06T15:05:13.422Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a0c5b685912abc710cd5dd

Added to database: 2/26/2026, 10:14:14 PM

Last enriched: 2/26/2026, 10:27:32 PM

Last updated: 2/27/2026, 1:26:37 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses