Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-3522

Опубликовано: 15 апр. 2025
Источник: redhat
CVSS3: 7.4

Описание

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

Отчет

Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10thunderbird-flatpak-containerAffected
Red Hat Enterprise Linux 6thunderbirdOut of support scope
Red Hat Enterprise Linux 7thunderbirdOut of support scope
Red Hat Enterprise Linux 9thunderbird-flatpak-containerAffected
Red Hat Enterprise Linux 10thunderbirdFixedRHSA-2025:750713.05.2025
Red Hat Enterprise Linux 8thunderbirdFixedRHSA-2025:464907.05.2025
Red Hat Enterprise Linux 8.2 Advanced Update SupportthunderbirdFixedRHSA-2025:438930.04.2025
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportthunderbirdFixedRHSA-2025:465407.05.2025
Red Hat Enterprise Linux 8.4 Telecommunications Update ServicethunderbirdFixedRHSA-2025:465407.05.2025
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsthunderbirdFixedRHSA-2025:465407.05.2025

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-1220
https://bugzilla.redhat.com/show_bug.cgi?id=2359793thunderbird: Leak of hashed Window credentials via crafted attachment URL

7.4 High

CVSS3

Связанные уязвимости

CVSS3: 6.3
ubuntu
2 месяца назад

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
nvd
2 месяца назад

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
debian
2 месяца назад

Thunderbird processes the X-Mozilla-External-Attachment-URL header to ...

CVSS3: 6.3
github
2 месяца назад

Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.

CVSS3: 6.3
fstec
2 месяца назад

Уязвимость почтового клиента Thunderbird, связанная с переадресацией URL на ненадежный сайт, позволяющая нарушителю перенаправить пользователя на произвольный URL-адрес

7.4 High

CVSS3