First published: Tue Oct 29 2024(Updated: )
In multipart/x-mixed-replace responses, `Content-Disposition: attachment` in the response header was not respected and did not force a download, which could allow XSS attacks. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132.
Affected Software | Affected Version | How to fix |
---|---|---|
Firefox | <132 | |
Firefox ESR | <128.4 | |
Thunderbird | <128.4<132 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2322425 is considered moderate due to potential XSS attack vectors.
To resolve REDHAT-BUG-2322425, update affected software versions to Firefox 132 or later, Firefox ESR 128.4 or later, and Thunderbird 128.4 or later.
REDHAT-BUG-2322425 affects Firefox versions below 132, Firefox ESR versions below 128.4, and Thunderbird versions below 128.4 and 132.
The risks associated with REDHAT-BUG-2322425 include the possibility of XSS attacks if the vulnerability is exploited.
No, REDHAT-BUG-2322425 is not present in newer releases, specifically Firefox 132 and above, Firefox ESR 128.4 and above, and Thunderbird 128.4 and above.