CVE-2020-15685 — Command Injection in Mozilla Thunderbird
Severity
8.8HIGHNVD
EPSS
0.6%
top 29.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 22
Description
During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird < 78.7.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages5 packages
Patches
🔴Vulnerability Details
2GHSA▶
GHSA-c839-4fpv-9xp7: During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session↗2022-12-22
OSV▶
CVE-2020-15685: During the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session↗2022-12-22
📋Vendor Advisories
4Debian▶
CVE-2020-15685: thunderbird - During the plaintext phase of the STARTTLS connection setup, protocol commands c...↗2020