First published: Tue Jul 26 2022(Updated: )
When visiting directory listings for `chrome://` URLs as source text, some parameters were reflected. This vulnerability affects Firefox ESR < 102.1, Firefox ESR < 91.12, Firefox < 103, Thunderbird < 102.1, and Thunderbird < 91.12.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <102.1 | 102.1 |
Thunderbird | <91.12 | 91.12 |
Firefox | <103.0 | |
Firefox ESR | <102.1 | |
Thunderbird | <102.1 | |
Firefox ESR | <91.12 | |
Thunderbird | <91.12 | |
Firefox | <103 | 103 |
Firefox ESR | <91.12 | 91.12 |
Firefox ESR | <102.1 | 102.1 |
<103.0 | ||
<102.1 | ||
<102.1 | ||
<91.12 | ||
<91.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2022-36318 is considered a moderate severity vulnerability affecting multiple Mozilla products.
To fix CVE-2022-36318, users should update to Firefox ESR version 91.12 or later, Firefox version 103 or later, or Thunderbird version 91.12 or later.
CVE-2022-36318 affects Firefox ESR versions prior to 102.1, Firefox versions prior to 103, Thunderbird versions prior to 102.1, and their respective 91.x releases.
Yes, CVE-2022-36318 can potentially be exploited remotely when visiting specially crafted URLs.
CVE-2022-36318 can allow attackers to reflect parameters in directory listings on chrome:// URLs, which may lead to information disclosure.