CVE-2017-7846Injection in Mozilla Thunderbird

CWE-74Injection9 documents8 sources
Severity
8.8HIGHNVD
OSV5.3
EPSS
1.3%
top 20.37%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 11
Latest updateMay 14

Description

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages7 packages

CVEListV5mozilla/thunderbirdunspecified52.5.2
NVDmozilla/thunderbird< 52.5.2
Debianmozilla/thunderbird< 1:52.5.2-1+3
Ubuntumozilla/thunderbird< 1:52.6.0+build1-0ubuntu0.14.04.1+1

Also affects: Debian Linux 7.0, 8.0, 9.0, Enterprise Linux 7.4, 7.5

🔴Vulnerability Details

4
GHSA
GHSA-2529-rwp4-75f6: It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e2022-05-14
OSV
CVE-2017-7846: It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e2018-06-11
CVEList
CVE-2017-7846: It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e2018-06-11
OSV
thunderbird vulnerabilities2018-01-29

📋Vendor Advisories

3
Ubuntu
Thunderbird vulnerabilities2018-01-29
Red Hat
Mozilla: JavaScript Execution via RSS in mailbox:// origin2017-12-22
Debian
CVE-2017-7846: thunderbird - It is possible to execute JavaScript in the parsed RSS feed when RSS feed is vie...2017

💬Community

1
Bugzilla
CVE-2017-7846 Mozilla: JavaScript Execution via RSS in mailbox:// origin2018-01-02
CVE-2017-7846 — Injection in Mozilla Thunderbird | cvebase