CVE-2022-3033

Published: Dic 22, 2022 Last Modified: Apr 15, 2025 EU-VD ID: EUVD-2022-42466 Aliases: GSD-2022-3033
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 8,1
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: required
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: none

Description

AI Translation Available

If a Thunderbird user replied to a crafted HTML email containing a <code>meta</code> tag, with the <code>meta</code> tag having the <code>http-equiv='refresh'</code> attribute, and the content attribute specifying an URL, then Thunderbird started a network request to that URL, regardless of the configuration to block remote content. In combination with certain other HTML elements and attributes in the email, it was possible to execute JavaScript code included in the message in the context of the message compose document. The JavaScript code was able to perform actions including, but probably not limited to, read and modify the contents of the message compose document, including the quoted original message, which could potentially contain the decrypted plaintext of encrypted data in the crafted email. The contents could then be transmitted to the network, either to the URL specified in the META refresh tag, or to a different URL, as the JavaScript code could modify the URL specified in the document. This bug doesn't affect users who have changed the default Message Body display setting to 'simple html' or 'plain text'. This vulnerability affects Thunderbird < 102.2.1 and Thunderbird < 91.13.1.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0056
Percentile
0,7th
Updated

EPSS Score Trend (Last 91 Days)

79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Stable
Common Consequences
Security Scopes Affected:
Access Control Confidentiality Integrity Availability
Potential Impacts:
Bypass Protection Mechanism Read Application Data Execute Unauthorized Code Or Commands
Applicable Platforms
Technologies: AI/ML, Web Based, Web Server
View CWE Details
Application

Thunderbird by Mozilla

Version Range Affected
From 102.0 (inclusive)
To 102.2.1 (exclusive)
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Thunderbird by Mozilla

Version Range Affected
To 91.13.1 (exclusive)
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://bugzilla.mozilla.org/show_bug.cgi?id=1784838
Issue Tracking Permissions Required Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1784838
https://www.mozilla.org/security/advisories/mfsa2022-38/
https://www.mozilla.org/security/advisories/mfsa2022-39/
https://bugzilla.mozilla.org/show_bug.cgi?id=1784838
Issue Tracking Permissions Required Vendor Advisory
https://bugzilla.mozilla.org/show_bug.cgi?id=1784838
https://www.mozilla.org/security/advisories/mfsa2022-38/
https://www.mozilla.org/security/advisories/mfsa2022-39/