A security vulnerability in Thunderbird allowed malicious sites to use redirects to send credentialed requests to arbitrary endpoints on any site that had invoked the Storage Access API. This enabled potential Cross-Site Request Forgery attacks across origins. This vulnerability affects Firefox < 138 and Thunderbird < 138.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Firefox | Mozilla | * | 138.0 (excluding) |
Thunderbird | Mozilla | * | 138.0 (excluding) |
Firefox | Ubuntu | focal | * |
Firefox | Ubuntu | upstream | * |
Mozjs102 | Ubuntu | esm-apps/noble | * |
Mozjs102 | Ubuntu | jammy | * |
Mozjs102 | Ubuntu | noble | * |
Mozjs115 | Ubuntu | devel | * |
Mozjs115 | Ubuntu | noble | * |
Mozjs115 | Ubuntu | oracular | * |
Mozjs115 | Ubuntu | plucky | * |
Mozjs52 | Ubuntu | esm-infra/bionic | * |
Mozjs52 | Ubuntu | focal | * |
Mozjs68 | Ubuntu | esm-infra/focal | * |
Mozjs68 | Ubuntu | focal | * |
Mozjs78 | Ubuntu | jammy | * |
Mozjs91 | Ubuntu | jammy | * |
Thunderbird | Ubuntu | focal | * |
Thunderbird | Ubuntu | jammy | * |
Thunderbird | Ubuntu | upstream | * |