Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-38472

Опубликовано: 22 дек. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 6.5

Описание

An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104.

РелизСтатусПримечание
bionic

released

104.0+build3-0ubuntu0.18.04.1
devel

not-affected

code not present
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

released

104.0+build3-0ubuntu0.20.04.1
jammy

not-affected

code not present
kinetic

not-affected

code not present
lunar

not-affected

code not present
trusty

ignored

end of standard support
trusty/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

released

1:102.2.2+build1-0ubuntu0.18.04.1
devel

not-affected

1:102.3.3+build1-0ubuntu1
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

released

1:102.2.2+build1-0ubuntu0.20.04.1
jammy

released

1:102.2.2+build1-0ubuntu0.22.04.1
kinetic

ignored

end of life, was needs-triage
lunar

not-affected

1:102.3.3+build1-0ubuntu1
trusty

ignored

end of standard support
trusty/esm

DNE

Показывать по

EPSS

Процентиль: 36%
0.00143
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 3 года назад

An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104.

CVSS3: 6.5
nvd
больше 2 лет назад

An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104.

CVSS3: 6.5
debian
больше 2 лет назад

An attacker could have abused XSLT error handling to associate attacke ...

CVSS3: 6.5
github
больше 2 лет назад

An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104.

CVSS3: 7.5
fstec
почти 3 года назад

Уязвимость реализации технологии XSLT (eXtensible Stylesheet Language Transformations) браузера Firefox и почтового клиента Thunderbirds, позволяющая нарушителю проводить спуфинг-атаки

EPSS

Процентиль: 36%
0.00143
Низкий

6.5 Medium

CVSS3