This vulnerability affects Firefox < 143, Firefox ESR < 140.3, Thunderbird < 143, and Thunderbird < 140.3.
The product uses a web-client protection mechanism such as a Content Security Policy (CSP) or cross-domain policy file, but the policy includes untrusted domains with which the web client is allowed to communicate.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Red Hat Enterprise Linux 10 | RedHat | firefox-0:140.3.0-1.el10_0 | * |
Red Hat Enterprise Linux 9 | RedHat | firefox-0:140.3.0-1.el9_6 | * |
Mozjs102 | Ubuntu | esm-apps/noble | * |
Mozjs102 | Ubuntu | jammy | * |
Mozjs102 | Ubuntu | noble | * |
Mozjs115 | Ubuntu | devel | * |
Mozjs115 | Ubuntu | noble | * |
Mozjs115 | Ubuntu | plucky | * |
Mozjs52 | Ubuntu | esm-apps/focal | * |
Mozjs52 | Ubuntu | esm-infra/bionic | * |
Mozjs68 | Ubuntu | esm-infra/focal | * |
Mozjs78 | Ubuntu | esm-apps/jammy | * |
Mozjs78 | Ubuntu | jammy | * |
Mozjs91 | Ubuntu | jammy | * |
Thunderbird | Ubuntu | jammy | * |
If a cross-domain policy file includes domains that should not be trusted, such as when using wildcards under a high-level domain, then the application could be attacked by these untrusted domains. In many cases, the attack can be launched without the victim even being aware of it.