CVE-2022-45414Sensitive Information Exposure in Mozilla Thunderbird

Severity
8.1HIGHNVD
OSV6.5
EPSS
0.3%
top 48.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 22
Latest updateFeb 6

Description

If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet hav

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:NExploitability: 2.8 | Impact: 5.2

Affected Packages5 packages

debiandebian/thunderbird< thunderbird 1:102.5.1-1 (bookworm)
NVDmozilla/thunderbird< 102.5.1
Debianmozilla/thunderbird< 1:102.6.0-1~deb11u1+3
Ubuntumozilla/thunderbird< 1:102.7.1+build2-0ubuntu0.18.04.1+2
mozillamozilla/firefox

🔴Vulnerability Details

3
OSV
thunderbird vulnerabilities2023-02-06
GHSA
GHSA-gvhr-fq94-q7h9: If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attr2022-12-22
OSV
CVE-2022-45414: If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attr2022-12-22

📋Vendor Advisories

4
Ubuntu
Thunderbird vulnerabilities2023-02-06
Red Hat
Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content2022-11-30
Debian
CVE-2022-45414: thunderbird - If a Thunderbird user quoted from an HTML email, for example by replying to the ...2022
Mozilla
Mozilla Foundation Security Advisory 2022-50: CVE-2022-45414