First published: Tue Oct 05 2021(Updated: )
Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
<93 | 93 | |
<91.2 | 91.2 | |
Mozilla Thunderbird | <91.2 | 91.2 |
<91.2 | 91.2 | |
Mozilla Firefox | <93.0 | |
Mozilla Firefox ESR | <91.2 | |
Mozilla Thunderbird | <91.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2021-38497 describes a vulnerability in Firefox, Thunderbird, and Firefox ESR that allows for plain-text validation message overlay and possible user confusion and spoofing attacks.
Firefox versions before 93, Thunderbird versions before 91.2, and Firefox ESR versions before 91.2 are affected by CVE-2021-38497.
The severity rating of CVE-2021-38497 is medium with a score of 6.5.
To fix CVE-2021-38497, update to Firefox version 93 or higher, Thunderbird version 91.2 or higher, or Firefox ESR version 91.2 or higher.
More information about CVE-2021-38497 can be found at the following references: [Mozilla Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1726621), [Mozilla Security Advisories](https://www.mozilla.org/en-US/security/advisories/mfsa2021-47/), [Mozilla Security Advisories](https://www.mozilla.org/security/advisories/mfsa2021-43/).