CVE Vulnerabilities

CVE-2017-7846

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Jun 11, 2018 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.8 IMPORTANT
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via View -> Feed article -> Website or in the standard format of View -> Feed article -> default format. This vulnerability affects Thunderbird < 52.5.2.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

NameVendorStart VersionEnd Version
Enterprise_linux_desktopRedhat6.0 (including)6.0 (including)
Enterprise_linux_desktopRedhat7.0 (including)7.0 (including)
Enterprise_linux_serverRedhat6.0 (including)6.0 (including)
Enterprise_linux_serverRedhat7.0 (including)7.0 (including)
Enterprise_linux_server_ausRedhat7.4 (including)7.4 (including)
Enterprise_linux_server_eusRedhat7.4 (including)7.4 (including)
Enterprise_linux_server_eusRedhat7.5 (including)7.5 (including)
Enterprise_linux_workstationRedhat6.0 (including)6.0 (including)
Enterprise_linux_workstationRedhat7.0 (including)7.0 (including)
Red Hat Enterprise Linux 6RedHatthunderbird-0:52.5.2-1.el6_9*
Red Hat Enterprise Linux 7RedHatthunderbird-0:52.5.2-1.el7_4*
ThunderbirdUbuntuartful*
ThunderbirdUbuntudevel*
ThunderbirdUbuntutrusty*
ThunderbirdUbuntuupstream*
ThunderbirdUbuntuxenial*
ThunderbirdUbuntuzesty*

Potential Mitigations

References