It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via View -> Feed article -> Website or in the standard format of View -> Feed article -> default format. This vulnerability affects Thunderbird < 52.5.2.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Enterprise_linux_desktop | Redhat | 6.0 (including) | 6.0 (including) |
Enterprise_linux_desktop | Redhat | 7.0 (including) | 7.0 (including) |
Enterprise_linux_server | Redhat | 6.0 (including) | 6.0 (including) |
Enterprise_linux_server | Redhat | 7.0 (including) | 7.0 (including) |
Enterprise_linux_server_aus | Redhat | 7.4 (including) | 7.4 (including) |
Enterprise_linux_server_eus | Redhat | 7.4 (including) | 7.4 (including) |
Enterprise_linux_server_eus | Redhat | 7.5 (including) | 7.5 (including) |
Enterprise_linux_workstation | Redhat | 6.0 (including) | 6.0 (including) |
Enterprise_linux_workstation | Redhat | 7.0 (including) | 7.0 (including) |
Red Hat Enterprise Linux 6 | RedHat | thunderbird-0:52.5.2-1.el6_9 | * |
Red Hat Enterprise Linux 7 | RedHat | thunderbird-0:52.5.2-1.el7_4 | * |
Thunderbird | Ubuntu | artful | * |
Thunderbird | Ubuntu | devel | * |
Thunderbird | Ubuntu | trusty | * |
Thunderbird | Ubuntu | upstream | * |
Thunderbird | Ubuntu | xenial | * |
Thunderbird | Ubuntu | zesty | * |