First published: Tue Jan 11 2022(Updated: )
It was possible to construct specific XSLT markup that would be able to bypass an iframe sandbox.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mozilla Firefox ESR | <91.5 | 91.5 |
<96 | 96 | |
<91.5 | 91.5 | |
<91.5 | 91.5 | |
Mozilla Firefox | <96.0 | |
Mozilla Firefox ESR | <91.5 | |
Mozilla Thunderbird | <91.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID of this issue is CVE-2021-4140.
The severity of CVE-2021-4140 is critical.
CVE-2021-4140 affects Firefox ESR versions before 91.5, Firefox versions before 96, and Thunderbird versions before 91.5.
An attacker can exploit CVE-2021-4140 by constructing specific XSLT markup to bypass an iframe sandbox.
You can find more information about CVE-2021-4140 in the following references: [Mozilla Bugzilla](https://bugzilla.mozilla.org/show_bug.cgi?id=1746720), [Mozilla Security Advisory MFSA2022-03](https://www.mozilla.org/en-US/security/advisories/mfsa2022-03/), [Mozilla Security Advisory MFSA2022-01](https://www.mozilla.org/en-US/security/advisories/mfsa2022-01/).