Mozilla Thunderbird < 17.0.8 XSS

Medium Nessus Network Monitor Plugin ID 8273

Synopsis

The remote host has a mail client installed that is vulnerable to multiple Cross-site scripting (XSS) attacks.

Description

Versions of Mozilla Thunderbird prior to 17.0.8 are affected by the following vulnerabilities :

- A flaw exists because the program does not validate URLs in IFRAME elements before returning it to users.
- A flaw exists because the program does not validate input when handling a specially crafted EMBED or OBJECT element.

These vulnerabilities may allow a context-dependent attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.

Solution

Upgrade to Thunderbird 17.0.8 or later.

See Also

https://bugzilla.mozilla.org/show_bug.cgi?id=875818

https://bugzilla.mozilla.org/show_bug.cgi?id=868267

Plugin Details

Severity: Medium

ID: 8273

Family: SMTP Clients

Published: 2014/05/27

Updated: 2019/03/06

Dependencies: 5558

Nessus ID: 69272

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

CVSS v3.0

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Patch Publication Date: 2014/02/06

Vulnerability Publication Date: 2014/02/06

Reference Information

CVE: CVE-2014-2018

BID: 65620