Mozilla Thunderbird < 17.0.8 XSS

low Nessus Network Monitor Plugin ID 8273

Synopsis

The remote host has a mail client installed that is vulnerable to multiple Cross-site scripting (XSS) attacks.

Description

Versions of Mozilla Thunderbird prior to 17.0.8 are affected by the following vulnerabilities :

- A flaw exists because the program does not validate URLs in IFRAME elements before returning it to users.
- A flaw exists because the program does not validate input when handling a specially crafted EMBED or OBJECT element.

These vulnerabilities may allow a context-dependent attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.

Solution

Upgrade to Thunderbird 17.0.8 or later.

See Also

https://bugzilla.mozilla.org/show_bug.cgi?id=875818

https://bugzilla.mozilla.org/show_bug.cgi?id=868267

Plugin Details

Severity: Low

ID: 8273

Family: SMTP Clients

Published: 5/27/2014

Updated: 3/6/2019

Nessus ID: 69272

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mozilla:thunderbird

Patch Publication Date: 2/6/2014

Vulnerability Publication Date: 2/6/2014

Reference Information

CVE: CVE-2014-2018

BID: 65620